Friday, March 29, 2024

Reliance Jio’s Coronavirus Symptom Checker App Exposes Users Data Online Due to Security Error

A security error with Reliance Jio’s Coronavirus Symptom Checker App exposes its core database to the Internet without a password.

The COVID-19 symptoms checker app was launched by India’s largest cell network provider Jio in late March, this app allows users to check from their phone for COVID-19 infection.

Jio Symptom Checker Database Leaked

The security error was first observed by security researcher Anurag Sen on May 1 and contacted TechCrunch to notify the company.

TechCrunch contacted Reliance Jio and the database contains reports of users’ Covid-19 tests that were taken offline quickly.

The leaked database includes millions of results starting from April 17 to the time it was taken offline.

It includes details of users such as age, gender, symptoms, and health data of the people who signed in to create a profile.

The database also contains details such as a person’s user agent, user’s precise location if they allowed the app to track the location.

Based on Samples obtained by TechCrunch

Based on the sample obtained, TechCrunch confirms they able to identify users’ home location based on the latitude and longitude records that present in the database.

Most of the users found to be from Mumbai and Pune, few users signed up from the United Kingdom and North America.

“We have taken immediate action,” said Jio spokesperson Tushar Pania. “The logging server was for monitoring performance of our website, intended for the limited purpose of people doing a self-check to see if they have any COVID-19 symptoms.”

The company not provided any details about how it informs the users about this security error.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles