124 Million Rows of Customer Data Exposed Through Leaky Adorcam Database
An unsecure database owned by webcam app Adorcam has exposed thousands of user accounts, according to security researcher Justin Paine.
Adorcam is a specialized app built for P2P IP webcams, allowing iPhone and Android users to control and watch livestream videos from their home by entering their camera ID and password.
The leaky database, discovered on an ElasticSearch server last month, included 124 million rows of customer data.
The researcher found various types of data, including user email address, client IP, user ld, web camera serial number, country location, SSID/ wireless network name and camera settings, such as the state of any embedded microphones.
Paine emphasized the sensitive nature of some user entries:
“Of particular interest â€“ the leaked information included sensitive details regarding their MQTT (a common standard messaging protocol for the Internet of Things (IoT) server,” he said. “Leaked fields include: hostname, port, password, and username.”
Some data rows also include email addresses the user shared web camera access with, and links that seem to leak to images captured by the webcam.
“I was not able to successfully load one of these images, but it seems like it could have exposed sensitive private images captured by the web camera,” Paine added.
Even if the leaked information was not highly sensitive, malicious actors could still use the data in phishing campaigns.
In his report, Paine provided an example of a convincing email:
This is Bob from Adorcam customer support. We noticed your $CAMERA_TYPE with $CAMERA_SERIAL_NUMBER seems to be malfunctioning on your wireless network named $WIRELESS_SSID_NAME.
Please login at $PHISHING_URL to resolve this issue.
Thanks, Adorcam customer support
Paine goes on to explain that a certain level of trust and credibility could be established using particularities of the leaked webcam information.
“The malicious actor would have plenty of details to establish trust and credibility with the victim of the phishing attack,” Paine said. “The attacker also had geographic information to launch a targeted attack in the user’s native language.”
Last but not least, exposed credentials, hostnames, and MQTT server details could allow cybercriminals to connect, download or modify user data remotely.
The researcher contacted Adorcam developers on January 14. The database was secured five days later.
Data breaches appear to be common events these days. Find out more about how you can regain control of your personal information with Bitdefender”s Digital Identity Protection.
August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War
August 31, 2022
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor
August 30, 2022
What is medical identity theft and how to protect against it
July 27, 2022
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside
June 28, 2022
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online
June 28, 2022