Reliance Jio’s Coronavirus Symptom Checker App Exposes Users Data Online Due to Security Error

A security error with Reliance Jio’s Coronavirus Symptom Checker App exposes its core database to the Internet without a password.

The COVID-19 symptoms checker app was launched by India’s largest cell network provider Jio in late March, this app allows users to check from their phone for COVID-19 infection.

Jio Symptom Checker Database Leaked

The security error was first observed by security researcher Anurag Sen on May 1 and contacted TechCrunch to notify the company.

TechCrunch contacted Reliance Jio and the database contains reports of users’ Covid-19 tests that were taken offline quickly.

The leaked database includes millions of results starting from April 17 to the time it was taken offline.

It includes details of users such as age, gender, symptoms, and health data of the people who signed in to create a profile.

The database also contains details such as a person’s user agent, user’s precise location if they allowed the app to track the location.

Based on Samples obtained by TechCrunch

Based on the sample obtained, TechCrunch confirms they able to identify users’ home location based on the latitude and longitude records that present in the database.

Most of the users found to be from Mumbai and Pune, few users signed up from the United Kingdom and North America.

“We have taken immediate action,” said Jio spokesperson Tushar Pania. “The logging server was for monitoring performance of our website, intended for the limited purpose of people doing a self-check to see if they have any COVID-19 symptoms.”

The company not provided any details about how it informs the users about this security error.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow…

24 hours ago

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers…

24 hours ago

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack…

24 hours ago

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has…

24 hours ago

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated…

1 day ago

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities…

1 day ago