The online dating app Heyyo left a server exposed on the internet without protection, data were stored on an Elasticsearch instance.
The exposed data included personal details, images, location data, phone numbers, and dating preferences for nearly 72,000 users.
The detailed data exposed left online included:
The news was first reported by ZDNet who was informed about the incident by security researchers from WizCase.
“Avishai Efrat, Wizcase leading hacktivist, discovered a severe data leak on Heyyo, a relatively new mobile dating app. Our team was able to access a database of over 70,000 users from around the world through an unsecured Elasticsearch engine.” reported WizCase. “The majority of affected users are based in Turkey, but there’s also a significant number from the US and Brazil, which is over ⅕ of their user base. “
ZDNet verified the authenticity of the data and contacted the Turkey-based company behind Heyyo to notify it of the leak, but the company did not reply for a week.
While waiting for a reply from the development team, the experts noticed that the number of registered users grew from 71,769 to 71,921. Experts also registered an account ad verified that associated data were leaked online. This circumstance suggests that the server was a live production system.
The server was taken down today after ZDNet contacted Turkey’s Computer Emergency Response Team (CERT).
Clearly, the exposure of this type of data poses serious risks, including the extortion, to the users’ privacy.
At the time of writing is unclear if anyone else had access to the exposed database.
Unfortunately, other dating platforms suffered similar incident in the past, including Ashley Madison, Grindr, 3Fun, and Luscious.
WizCase also has its own report on the leak, for additional reading.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Heyyo, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…
Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…
Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…
GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…
The Czech government condemned China after linking cyber espionage group APT31 to a cyberattack on…
PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…
This website uses cookies.