Friday, February 14, 2025
HomeCyber AttackStreaming Platform Gaint Lionsgate Exposes Over 37m Users' Data

Streaming Platform Gaint Lionsgate Exposes Over 37m Users’ Data

Published on

SIEM as a Service

Follow Us on Google News

Lions Gate Entertainment Corporation, doing business as Lionsgate, exposed users’ IP addresses and data on the content they saw on its movie-streaming service. 

According to Cybernews analysts, Lionsgate Play, a video streaming service, had exposed user information via an open ElasticSearch instance.

The platform is run by the Canadian-American entertainment company Lionsgate Entertainment Corporation, which owns several well-known film and television franchises that have become famous, including The Hunger Games, Saw, Terminator, The Twilight Saga, and The Divergent Series.

Almost 37 million people worldwide subscribe to Lionsgate, which made $3.6 billion in income the previous year.

Leak Caused By an Unprotected ElasticSearch Instance

“An unprotected 20GB of server logs that contained nearly 30 million entries, with the oldest dated May 2022. The logs exposed subscribers’ IP addresses and user data concerning device, operating system, and web browser”, explains Cybernews researchers.

There were additional leaks of usage information, including titles and IDs of the content users watched on the platform. Analysts typically utilize this information to monitor the platform’s performance and content.

Researchers also discovered unidentified hashes with logged HTTP GET requests—records of client requests often used to obtain data from a web server—and log files on the server that contained these queries.

“Hashes didn’t match any commonly used hashing algorithms. Since these hashes were included in the HTTP requests, we believe they could have been used as secrets for authentication, or just user IDs,” said researchers.

The actual purpose or use of the hashes was not known to researchers. However, the fact that all the hashes are longer than 156 characters suggests that they were designed to hold their integrity for a long time.

Researchers say the information exposed in this case is unusual for hacker networks to share. It is nevertheless still sensitive.

“It can be useful in targeted attacks, especially when combined with other leaked or publicly available information,” researchers

.Malicious actors may target specific users and deliver dangerous payloads to their devices using the combination of users’ IP addresses and data.

“Threat actors can cross-reference a user’s search queries and viewed content with their IP address to build a more comprehensive profile of the individual,” researchers said.

Hence, researchers warn that threat actors can spot behavior patterns and use this information to craft more precise, targeted phishing attacks to collect personal information.

Building Your Malware Defense Strategy – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...

BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks

A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...