An unsecure database owned by webcam app Adorcam has exposed thousands of user accounts, according to security researcher Justin Paine.
Adorcam is a specialized app built for P2P IP webcams, allowing iPhone and Android users to control and watch livestream videos from their home by entering their camera ID and password.
The leaky database, discovered on an ElasticSearch server last month, included 124 million rows of customer data.
Exposed data
The researcher found various types of data, including user email address, client IP, user ld, web camera serial number, country location, SSID/ wireless network name and camera settings, such as the state of any embedded microphones.
Paine emphasized the sensitive nature of some user entries:
“Of particular interest – the leaked information included sensitive details regarding their MQTT (a common standard messaging protocol for the Internet of Things (IoT) server,” he said. “Leaked fields include: hostname, port, password, and username.”
Some data rows also include email addresses the user shared web camera access with, and links that seem to leak to images captured by the webcam.
“I was not able to successfully load one of these images, but it seems like it could have exposed sensitive private images captured by the web camera,” Paine added.
Associated risks
Even if the leaked information was not highly sensitive, malicious actors could still use the data in phishing campaigns.
In his report, Paine provided an example of a convincing email:
Hi $ACCOUNT_EMAIL_ADDRESS
This is Bob from Adorcam customer support. We noticed your $CAMERA_TYPE with $CAMERA_SERIAL_NUMBER seems to be malfunctioning on your wireless network named $WIRELESS_SSID_NAME.
Please login at $PHISHING_URL to resolve this issue.
Thanks, Adorcam customer support
Paine goes on to explain that a certain level of trust and credibility could be established using particularities of the leaked webcam information.
“The malicious actor would have plenty of details to establish trust and credibility with the victim of the phishing attack,” Paine said. “The attacker also had geographic information to launch a targeted attack in the user’s native language.”
Last but not least, exposed credentials, hostnames, and MQTT server details could allow cybercriminals to connect, download or modify user data remotely.
The researcher contacted Adorcam developers on January 14. The database was secured five days later.
Data breaches appear to be common events these days. Find out more about how you can regain control of your personal information with Bitdefender”s Digital Identity Protection.
tags
Alina is a history buff passionate about cybersecurity and anything sci-fi, advocating Bitdefender technologies and solutions. She spends most of her time between her two feline friends and traveling.
View all postsNovember 14, 2024
September 06, 2024