Thursday, January 9, 2025
HomeCyber AttackGravy Analytics Hit by Cyberattack, Hackers Allegedly Stole data

Gravy Analytics Hit by Cyberattack, Hackers Allegedly Stole data

Published on

Gravy Analytics, a prominent player in location intelligence, has reportedly fallen victim to a significant cyberattack. Initial investigations suggest that hackers have exfiltrated sensitive data, raising concerns over consumer privacy and data security.

Founded to enhance business decision-making through location-based insights, Gravy Analytics collects anonymized location data from mobile devices.

This information is utilized to provide businesses with an understanding of consumer behavior, empowering them to optimize marketing strategies and operations. However, Gravy has previously faced scrutiny, notably for its data handling practices.

Recent Controversies

In December 2023, the Federal Trade Commission (FTC) accused Gravy Analytics and its subsidiary, Venntel Inc., of mishandling consumer data.

The FTC’s complaint alleged violations of the FTC Act, claiming that Gravy Analytics sold sensitive location data without acquiring verifiable consent from users.

This data included sensitive consumer characteristics, such as health-related decisions, political affiliations, and religious beliefs. The accusations highlighted the ethical concerns surrounding the collection and commercialization of location data, particularly in light of consumer consent.

Allegations of a Data Breach

On January 7, 2025, a hacker group purportedly shared information on a forum that suggests a large-scale data breach at Gravy Analytics. According to Net Eye reports, the attackers exfiltrated a wide array of sensitive information, including IP addresses, BSSID, emails, and device user agents.

The hackers have reportedly made available approximately 1.4GB of data, including sample archives which, while still under analysis, appear to confirm the breach occurred.

exfiltrated data
exfiltrated data

The implications of this incident could be profound, not only for Gravy Analytics but also for its clients, many of whom are major players in the marketing and data analytics sectors. With user profiles and client data potentially compromised, there is widespread concern regarding the security of sensitive information.

As of now, Gravy Analytics’ website has been taken down, displaying a 503 error, which indicates the site is currently unavailable, adding uncertainty about the company’s operational status following the attack.

As the situation develops, both consumers and businesses that rely on Gravy Analytics are urged to remain vigilant. Monitoring for any unusual activity related to compromised information will be critical.

This incident serves as a stark reminder of the importance of robust cybersecurity measures and the ethical handling of consumer data in an increasingly digital world.

As investigations continue, stakeholders will be eagerly awaiting further updates to understand the full extent of the breach, the potential risks involved, and the steps that Gravy Analytics will take to address these serious allegations.

ANY.RUN Threat Intelligence Lookup - Extract Millions of IOC's for Interactive Malware Analysis: Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ivanti 0-Day Vulnerability Exploited in Wild-Patch Now

Ivanti released a critical security advisory addressing vulnerabilities in its Connect Secure, Policy Secure,...

Wireshark 4.4.3 Released: What’s New!

The Wireshark development team announced the release of Wireshark version 4.4.3, a critical update...

Researchers Reveal Exploitation Techniques of North Korean Kimsuky APT Group

Since 2013, the advanced persistent threat (APT) known as Kimsuky, which the North Korean...

Mirai Botnet Variant Exploits Zero-Day Vulnerabilities in Routers

Researchers observed the Gayfemboy botnet in early 2024 as a basic Mirai variant. Still,...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Ivanti 0-Day Vulnerability Exploited in Wild-Patch Now

Ivanti released a critical security advisory addressing vulnerabilities in its Connect Secure, Policy Secure,...

Wireshark 4.4.3 Released: What’s New!

The Wireshark development team announced the release of Wireshark version 4.4.3, a critical update...

Researchers Reveal Exploitation Techniques of North Korean Kimsuky APT Group

Since 2013, the advanced persistent threat (APT) known as Kimsuky, which the North Korean...