U.S. Markets close in 4 hrs 11 mins
  • S&P 500

    4,175.99
    +41.01 (+0.99%)
     
  • Dow 30

    33,990.84
    +174.94 (+0.52%)
     
  • Nasdaq

    14,007.21
    +188.79 (+1.37%)
     
  • Russell 2000

    2,265.02
    +32.41 (+1.45%)
     
  • Crude Oil

    61.76
    +0.33 (+0.54%)
     
  • Gold

    1,775.90
    -6.10 (-0.34%)
     
  • Silver

    26.04
    -0.14 (-0.53%)
     
  • EUR/USD

    1.2073
    +0.0055 (+0.4588%)
     
  • 10-Yr Bond

    1.5650
    +0.0110 (+0.71%)
     
  • Vix

    17.35
    -1.36 (-7.27%)
     
  • GBP/USD

    1.3848
    +0.0006 (+0.0402%)
     
  • USD/JPY

    107.9400
    -0.0200 (-0.0185%)
     
  • BTC-USD

    49,757.71
    -4,902.82 (-8.97%)
     
  • CMC Crypto 200

    1,145.69
    +21.80 (+1.94%)
     
  • FTSE 100

    6,934.08
    -4.16 (-0.06%)
     
  • Nikkei 225

    29,020.63
    -167.57 (-0.57%)
     

A webcam app left thousands of user accounts exposed online

Zack Whittaker
·1 min read

A webcam app installed by thousands of users left an exposed database packed with user data on the internet without a password.

The Elasticsearch database belonged to Adorcam, an app for viewing and controlling several webcam models including Zeeporte and Umino cameras. Security researcher Justin Paine discovered the data exposure and contacted Adorcam, which secured the database.

Paine said in a blog post shared with TechCrunch that the database contained about 124 million rows of data for the several thousand users, and included live details about the webcam — such as its location, whether the microphone was active and name of the WiFi network that the camera is connected to — and information about the webcam owner, such as email addresses.

Read more

Paine also found evidence of the camera uploading captured stills from the webcam to the app's cloud, though he could not verify since the links had expired.

He also found hardcoded credentials in the database for the app's MQTT server, a lightweight messaging protocol often used in internet-connected devices. Paine did not test the credentials (as doing so would be unlawful in the U.S.), but also alerted the app maker to the vulnerability, who then changed the password.

Paine verified that the database was updating live by signing up with a new account and searching for his information in the database. Although the data was limited in sensitivity, Paine warned that a malicious hacker could craft convincing phishing emails, or use the information for extortion.

Adorcam did not return our emails with questions — including if the company planned to inform users of the incident.