2 min read

Mystery Server Found to Host Private Data in the Open for 1.2 Billion People

Silviu STAHIE

November 27, 2019

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Mystery Server Found to Host Private Data in the Open for 1.2 Billion People

Personal data for 1.2 billion people was discovered in an open Elasticsearch server. It’s unclear who owned the server, how the data got there, who had access to it, and how long sat in the open, free for anyone to access.

The more than 4 terabytes of data was discovered by security researchers from Data Viper. Unlike other troves, this simple database didn’t hold user names and passwords, but personal data, such as names, email addresses, phone numbers, LinkedIn, and Facebook profiles, scrapped off the Internet.

This type of information is collected online from social media accounts that allow public access, and it seems that there’s no shortage of people who don’t know that the whole world has access to their data, which most of the time includes stuff you wouldn’t knowingly give strangers.

“For a very low price, data enrichment companies allow you to take a single piece of information on a person (such as a name or email address), and expand (or enrich) that user profile to include hundreds of additional new data points of information,” says security researcher Vinny Troia. “Collected information on a single person can include information such as household sizes, finances and income, political and religious preferences, and even a person’s preferred social activities.”

It turned out that few companies provide data “enrichment” as a service, and most of the data found in the Elasticsearch server was identified as belonging to People Data Labs (PDL). One interesting point is that the PDL data contains education histories, which the mystery server doesn’t list.

Finally, since PDL denies suffering a breach, it’s challenging to find someone accountable. The open Elasticsearch server doesn’t seem to have any link to PDL, and Google Cloud hosted the information. This also means it’s impossible to know, without a court order, who set it up. The FBI and other law agencies won’t get involved unless a crime was committed, and technically that’s not the case, at least not yet.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read