banner Expire 1 July 2024
Ad Ends 13 July 2024
banner Expire 15 July 2024
banner Expire 18 October 2024
ad End 18 October 2024
Ad Ends 13 July 2023
banner Expire 20 July 2024
What's new
Ad expire at 5 June 2024
UniCvv
CrdCrew.cc Carding forum
Western union transfer
Kfc CLub
Carding.pw carding forum
adv exp at 23 August 2024

ESCO

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 28, 2020
Messages
6,314
Reaction score
711
Points
212
Awards
2
  • Somebody Likes you
  • First post
More than 4,000 applications using Google Firebase are not properly protected.






More than 4 thousand Android applications that use Google Firebase cloud databases inadvertently disclose confidential information about their users, including email addresses, logins, passwords, phone numbers, full names, chat messages and location data.

Specialist Bob Diachenko from Security Discovery, together with Comparitech, found this out by analyzing more than 515 thousand Android applications.

“4.8% of mobile applications on the Google Play Store that use Firebase to store user data are not properly protected, allowing a potential attacker to gain access to databases containing personal information of users, access tokens and other insecure data without a password or any another authentication, ”explained experts

Firebase is a popular platform for developing mobile applications, offering developers various tools for creating programs, secure data storage, fixed Problems and user interactions through the messaging feature.

According to the researchers, since Firebase is a cross-platform tool, improper configuration can also affect iOS and web applications.

The full contents of the database, covering 4282 applications, includes more than 7 million email addresses, 4.4 million logins, 1 million passwords, 5.3 million phone numbers, 18.3 million full names, 6.8 million chat messages, 6, 2 million GPS data, 156 thousand IP addresses and 560 thousand real addresses.

During the analysis, experts also found 9 thousand applications with write permissions, potentially allowing an attacker to inject malicious data, damage the database and even install malware.

Incorrect Firebase configuration allows attackers to easily find and steal data. By simply adding “.json” to the end of the Firebase URL, an attacker can view and download the contents of vulnerable databases. Although Google removed vulnerable database URLs from search results back in 2021, they are still indexed by other search engines such as Bing.

__________________
 
Ad End 1 July 2024
Top