UK markets closed
  • FTSE 100

    6,630.52
    -20.36 (-0.31%)
     
  • FTSE 250

    20,961.31
    -334.92 (-1.57%)
     
  • AIM

    1,163.26
    -10.13 (-0.86%)
     
  • GBP/EUR

    1.1607
    +0.0010 (+0.09%)
     
  • GBP/USD

    1.3834
    -0.0060 (-0.43%)
     
  • BTC-GBP

    36,634.74
    +1,612.08 (+4.60%)
     
  • CMC Crypto 200

    982.93
    +39.75 (+4.21%)
     
  • S&P 500

    3,841.94
    +73.47 (+1.95%)
     
  • DOW

    31,496.30
    +572.16 (+1.85%)
     
  • CRUDE OIL

    66.28
    +2.45 (+3.84%)
     
  • GOLD FUTURES

    1,698.20
    -2.50 (-0.15%)
     
  • NIKKEI 225

    28,864.32
    -65.78 (-0.23%)
     
  • HANG SENG

    29,098.29
    -138.50 (-0.47%)
     
  • DAX

    13,920.69
    -135.65 (-0.97%)
     
  • CAC 40

    5,782.65
    -48.00 (-0.82%)
     

A webcam app left thousands of user accounts exposed online

Zack Whittaker
·1-min read

A webcam app installed by thousands of users left an exposed database packed with user data on the internet without a password.

The Elasticsearch database belonged to Adorcam, an app for viewing and controlling several webcam models including Zeeporte and Umino cameras. Security researcher Justin Paine discovered the data exposure and contacted Adorcam, which secured the database.

Paine said in a blog post shared with TechCrunch that the database contained about 124 million rows of data for the several thousand users, and included live details about the webcam — such as its location, whether the microphone was active and name of the WiFi network that the camera is connected to — and information about the webcam owner, such as email addresses.

Read more

Paine also found evidence of the camera uploading captured stills from the webcam to the app's cloud, though he could not verify since the links had expired.

He also found hardcoded credentials in the database for the app's MQTT server, a lightweight messaging protocol often used in internet-connected devices. Paine did not test the credentials (as doing so would be unlawful in the U.S.), but also alerted the app maker to the vulnerability, who then changed the password.

Paine verified that the database was updating live by signing up with a new account and searching for his information in the database. Although the data was limited in sensitivity, Paine warned that a malicious hacker could craft convincing phishing emails, or use the information for extortion.

Adorcam did not return our emails with questions — including if the company planned to inform users of the incident.