FitMetrix Unprotected Passwordless Database Exposed Millions of User​ Data

Fitmetrix is a fitness company that builds fitness tracking software for the gym, studios that track heart rate and other fitness metrics.

The company exposed a passwordless database hosted on AWS contains millions of customer records such as name, gender, email address, birth date, home and work phone, height, weight and much more.

The huge database with 119GB of data was indexed by Shodan and was found by Bob Diachenko, Director of Cyber Risk Research at Hacken.

Also, shodan labeled the database as compromised and a readme file inside the database contains a ransom note.

Ransom notes read as follows

“mail”:”abightly59@cock.li”,”note”:”14ARsVT9vbK4uJzi78cSWh1NKyiA2fFJf3″,”btc“:”ALL YOUR INDEX AND ELASTICSEARCH DATA HAVE BEEN BACKED UP AT OUR SERVERS, TO RESTORE SEND 0.1 BTC TO THIS BITCOIN ADDRESS 14ARsVT9vbK4uJzi78cSWh1NKyiA2fFJf3 THEN SEND AN EMAIL WITH YOUR SERVER IP, DO NOT WORRY, WE CAN NEGOCIATE IF CAN NOT PAY”}}]}}

The researcher said that “the attackers are using a script that automates the process of accessing a database, possibly exporting it, deleting the database, and then creating the ransom note.”

But the script fails and the database is not encrypted, the Passwordless Database appears to have audit data from July 15th to Sept 19th, 2018.

Diachenko contacted FitMetrix and Mindbody initially there is no response, “Taking into account the size and sensitivity of data, we have decided to contact trusted journalists with whom we worked on several similar cases in the past, so they could reach out to the company via their ‘media channels’ and grab their attention.”

“Finally, after several notification attempts, Mindbody responded and the database was secured on October 10th,” the researcher said in the blog post.

Related Read

Best ways to Lock Down the Highly Sensitive Data From the Massive Breaches

Hackers Uploaded 42M Record that Contains Email Address and Credit Card Data to Free Anonymous Hosting Service

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

12 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

12 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

15 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

18 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

19 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

19 hours ago