Millions of customer personal data exposed online due to a Misconfiguration with MongoDB that belongs to Ai.Type, the company that well know for developing the personalized virtual keyboard app for Android and iOS.
Security researchers from Kromtech Security Center identified that the company exposed their entire 577GB Mongo-hosted in public, anyone with internet connection can access the database.
Ai keyboards downloaded by more than 40 million users around the world and the researchers claim that they can access the data and details of 31,293,959 users.
They tested the app and identified it asking full permission which includes all keyboard data. Based on the leaked databases it seems they are collecting all the data starting from contacts to keystrokes.
From Android 6.0 + version users are forced to manually allow the permission for the access contact or other data, but users continue to provide data in exchange for free and cheap products.
It consists of Personal details of 31,293,959 users who installed ai.type virtual keyboard.It consists of following Sensitive information.
Theoretically, it is logical that anyone who has downloaded and installed the Ai.Type virtual keyboard on their phone has had all of their phone data exposed publicly online. Says Bob Diachenko.
Is it a virtual keyboard app or a spyware? always the first layer of defense is the awareness. Stay vigil while allowing permissions for the app.
Paypal Acquired firm TIO Networks Data Breach that Impacts 1.6 Million Customers
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…