Saturday, March 2, 2024

Reliance Jio’s Coronavirus Symptom Checker App Exposes Users Data Online Due to Security Error

A security error with Reliance Jio’s Coronavirus Symptom Checker App exposes its core database to the Internet without a password.

The COVID-19 symptoms checker app was launched by India’s largest cell network provider Jio in late March, this app allows users to check from their phone for COVID-19 infection.

Jio Symptom Checker Database Leaked

The security error was first observed by security researcher Anurag Sen on May 1 and contacted TechCrunch to notify the company.

TechCrunch contacted Reliance Jio and the database contains reports of users’ Covid-19 tests that were taken offline quickly.

The leaked database includes millions of results starting from April 17 to the time it was taken offline.

It includes details of users such as age, gender, symptoms, and health data of the people who signed in to create a profile.

The database also contains details such as a person’s user agent, user’s precise location if they allowed the app to track the location.

Based on Samples obtained by TechCrunch

Based on the sample obtained, TechCrunch confirms they able to identify users’ home location based on the latitude and longitude records that present in the database.

Most of the users found to be from Mumbai and Pune, few users signed up from the United Kingdom and North America.

“We have taken immediate action,” said Jio spokesperson Tushar Pania. “The logging server was for monitoring performance of our website, intended for the limited purpose of people doing a self-check to see if they have any COVID-19 symptoms.”

The company not provided any details about how it informs the users about this security error.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles