Tuesday, April 15, 2025
Homecyber securityMicrosoft Bing Server Leaks Search Queries, Location Data, and Device Details

Microsoft Bing Server Leaks Search Queries, Location Data, and Device Details

Published on

SIEM as a Service

Follow Us on Google News

Security researchers from WizCase uncovered a massive data leak in the Microsoft Bing mobile app that exposes search queries, device details, and GPS coordinates.

Ata Hakcil uncovered the massive leak in the server owned by Microsoft for logging data related to its Bing mobile app.

Bing app used to perform millions of searches per day and it has more than 10,000,000 downloads on Google Play alone.

- Advertisement - Google News

Microsoft Bing Server Data Leak

Hakcil confirmed his findings by running a search for “Wizcase” through a mobile app and while checking with the unprotected bing server “he found his information, including search queries, device details, and GPS coordinates, proving the exposed data comes directly from the Bing mobile app.”

The exposed server has records of search queries from more than 70 countries. The server believed to have exposed more than 6.5TB log files and the storage growing by 200GB per day.

According to the Wizcase scanner “server was password protected until the first week of September. Our team discovered the leak on September 12th, approximately two days after the authentication was removed.”

Users who used bing mobile app for searching in the meantime has been exposed is at risk. The following are the data exposed that includes;

  • Search Terms in clear text excluding the ones entered in private mode
  • Location Coordinates
  • The exact time of the search
  • Firebase Notification Tokens
  • Coupon Data
  • URLs clicked from search results
  • Device model
  • Operating System
  • Unique ID(ADID, deviceID, devicehash)

The issue was reported to MSRC – Microsoft Security Response Center by September 13th and the server was secured on September 14.

In the meantime, researchers observed that Meow hackers attacked and deleted nearly the entire database. The second Meow attack on the server on September 14.

Meow hackers are known for destroying unsecured databases, they use some bots which overwrites all of the data, effectively destroying the contents of the database.

The data was exposed to all types of hackers and scammers, having the data attackers can launch a variety of attacks against users of the Bing mobile app.

If you are a bing mobile app user, pay a bit more attention to the when opening emails from unknown senders.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

A Bug With Firefox for Android Let Attackers Hijack without user Interaction on the Same WiFi Network

Top 10 Best App Locks and Privacy Lock for Android Devices in 2020

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...