Sunday, April 6, 2025
HomeData Breach31 Million Data Leaked Online Reveal that keyboard App Collects Everything from...

31 Million Data Leaked Online Reveal that keyboard App Collects Everything from Contacts to Keystrokes

Published on

SIEM as a Service

Follow Us on Google News

Millions of customer personal data exposed online due to a Misconfiguration with MongoDB that belongs to Ai.Type, the company that well know for developing the personalized virtual keyboard app for Android and iOS.

Security researchers from Kromtech Security Center identified that the company exposed their entire 577GB Mongo-hosted in public, anyone with internet connection can access the database.

Ai keyboards downloaded by more than 40 million users around the world and the researchers claim that they can access the data and details of 31,293,959 users.
keyboard app

They tested the app and identified it asking full permission which includes all keyboard data. Based on the leaked databases it seems they are collecting all the data starting from contacts to keystrokes.

keyboard app

From Android 6.0 + version users are forced to manually allow the permission for the access contact or other data, but users continue to provide data in exchange for free and cheap products.

What does the Leaked Database Consist of

It consists of Personal details of 31,293,959 users who installed ai.type virtual keyboard.It consists of following Sensitive information.

  • Phone number, the full name of the owner, device name, and model.
  • Mobile network name, SMS number, screen resolution, user languages enabled.
  • Android version, IMSI number (international mobile subscriber identity used for interconnection).
  • IMEI number (a unique number given to every single mobile phone), emails associated with the phone, country of residence, links.
  • Information associated with the social media profiles (birthdate, title, emails, etc.) and photo (links to Google+, Facebook, etc.), IP (if available), location details (long/lat).

Theoretically, it is logical that anyone who has downloaded and installed the Ai.Type virtual keyboard on their phone has had all of their phone data exposed publicly online. Says Bob Diachenko.

Is it a virtual keyboard app or a spyware? always the first layer of defense is the awareness. Stay vigil while allowing permissions for the app.

Some of Very Recent Data Leaked Online

  1. Famous Cosmetic Company “Tarte” leaked 2 Million Customers Personal Data Online
  2. Fashion Retailer FOREVER 21 Admits Payment Card Security Breach
  3. Accenture Data Leak Exposed 137 Gigabytes of Highly Sensitive Data Online
  4.  Deloitte Hacked by Cyber Criminals and Revealed Client & Employee’s Secret Emails
  5. Leading research and advisory firms Forrester was hacked
  6. Disqus confirms it’s been hacked and more than 17.5 Million Users Details Exposed
  7. Gaming Service R6DB Database deleted By Hackers and held for Ransom
  8. Biggest Hack Ever – Each and Every Single Yahoo Account Was Hacked in 2013
  9. Pizza Hut Hacked – Users Reporting Fraudulent Transactions on their Cards
  10. Hyatt Hotels Data Breach Exposed 41 Hotel Customers Payment Card Information
  11. Verizon Wireless Confidential DataLeaked Accidentally by Its Employee
  12. ABC Company Massive Data Leaked online from Amazon S3 Bucket
  13. Pentagon Data Leak Exposed 1.8 Billion of Social Media Surveillance Data
  14. Uber Data Breach Exposed Personal Information of 57 Million Uber Users
  15. HP Exposed more than 400,000 Customers Sensitive Information Online
  16. Imgur Data Breach Exposed 1.7 Million Users Emails and Passwords by Hackers
  17. Paypal Acquired firm TIO Networks Data Breach that Impacts 1.6 Million Customers

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers

The State Bar of Texas has confirmed a data breach following the detection of...

Oracle Confirms The Data Breach- Starts Initiating Client Notifications

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking...

Massive 400GB X (Twitter) Data Leaked – 2.8 Billion Records Exposed

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...