Monday, July 15, 2024
EHA

OkCupid Vulnerabilities Let Hackers to Steal the Personal and Sensitive Data of Users

OkCupid is one of the most popular dating apps that has more than 50 million registered users and used in 110 countries. The app was launched first in 2004 by four friends from Harvard.

In 2019, the app claims that they made 91 million connections at an average with an average of 50,000 dates arranged every week. In the pandemic, they observed a 20% increase in the conversation.

Here to make connections, OkCupid builds personal profiles for all its users by requesting detailed personal information to make a match. The sensitive information is used by hackers to launch targeted attacks.

Multiple Flaws Discovered

The vulnerabilities found by researchers with app version Version 40.3.1 which was released on Apr 29, 2020, the most recent version is Version 43.3.2, which was released yesterday.

The app uses deep links functionality which lets attackers include a custom link with the app manifest file to open a web view (browser) window with JavaScript enabled and it returns the user cookies.

Check Point researchers found https://www.OkCupid.com, is vulnerable to an XSS attack. The injection point found under user settings functionality.

In the web, the platform found that the CORS(Cross-Origin Resource Sharing) policy of the API server api.OkCupid.com is not configured properly and any origin can send requests to the server and read its’ responses.

The chain of vulnerabilities could allow attackers too;

  • Expose users’ sensitive data stored on the app.
  • Perform actions on behalf of the victim.
  • Steals users’ profile and private data, preferences, and characteristics.
  • Steals users’ authentication token, users’ IDs, and other sensitive information such as email addresses.
  • Send the data gathered to the attacker’s server.

Check Point Research reported the vulnerabilities to OkCupid and they managed to fix the vulnerabilities in 48hrs. “Not a single user was impacted by the potential vulnerability on OkCupid,” the company said.

Users are recommended to update with the laters version(43.3.2) to mitigate the risks.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

Hackers Infect More than 500,000 Routers Worldwide with a Potentially Destructive VPNFilter Malware

New eCh0raix Ransomware Attacking Linux File Storage Servers

Website

Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles