The online dating app Heyyo left a server exposed on the internet without protection, data were stored on an Elasticsearch instance.
The exposed data included personal details, images, location data, phone numbers, and dating preferences for nearly 72,000 users.
The detailed data exposed left online included:
The news was first reported by ZDNet who was informed about the incident by security researchers from WizCase.
“Avishai Efrat, Wizcase leading hacktivist, discovered a severe data leak on Heyyo, a relatively new mobile dating app. Our team was able to access a database of over 70,000 users from around the world through an unsecured Elasticsearch engine.” reported WizCase. “The majority of affected users are based in Turkey, but there’s also a significant number from the US and Brazil, which is over ⅕ of their user base. “
ZDNet verified the authenticity of the data and contacted the Turkey-based company behind Heyyo to notify it of the leak, but the company did not reply for a week.
While waiting for a reply from the development team, the experts noticed that the number of registered users grew from 71,769 to 71,921. Experts also registered an account ad verified that associated data were leaked online. This circumstance suggests that the server was a live production system.
The server was taken down today after ZDNet contacted Turkey’s Computer Emergency Response Team (CERT).
Clearly, the exposure of this type of data poses serious risks, including the extortion, to the users’ privacy.
At the time of writing is unclear if anyone else had access to the exposed database.
Unfortunately, other dating platforms suffered similar incident in the past, including Ashley Madison, Grindr, 3Fun, and Luscious.
WizCase also has its own report on the leak, for additional reading.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Heyyo, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…
An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…
Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…
Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…
Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…
Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…
This website uses cookies.