An online dating app, Jack’d have been hacked and millions of x-rated selfies that were privately exchanged between the users have been leaked online. According to a report by BBC news, anyone with a web browser and knows where to look can access the photos, even without a Jack’d account. Researcher Oliver Hough told BBC
An online dating app, Jack’d have been hacked and millions of x-rated selfies that were privately exchanged between the users have been leaked online.
According to a report by BBC news, anyone with a web browser and knows where to look can access the photos, even without a Jack’d account.
Researcher Oliver Hough told BBC News he had reported the flaw to Jack’d a year ago.
Jack’d have been downloaded more than five million times on the Google Play app store. It lets members add “private” photos to their profile, which should be visible to only specific people they have chosen to share them with. However, Mr Hough found that all the photos shared in the app were uploaded to the same open web server, leaving them exposed. “They acknowledged my report but then just went silent and did nothing,” Mr Hough told BBC News.
According to news website Ars Technica, Jack’d application has been leaving images posted by users and marked as “private” in chat sessions open to browsing on the Internet, potentially exposing the privacy of thousands of users. Photos were uploaded to an AWS S3 bucket accessible over an unsecured Web connection, identified by a sequential number. By simply traversing the range of sequential values, it was possible to view all images uploaded by Jack’d users, public or private. Additionally, location data and other metadata about users were accessible via the application’s unsecured interface’s backend data.
The result was that intimate, private images including pictures of genitalia and photos that revealed information about users’ identity and location—were exposed to public view. Because the images were retrieved by the application over an insecure Web connection, they could be intercepted by anyone monitoring network traffic, including officials in areas where homosexuality is illegal, homosexuals are persecuted, or by other malicious actors. And since location data and phone identifying data were also available, users of the application could be targeted.
Earlier this week, the company’s CEO, Mark Girolamo, told Ars Technica a fix would be deployed on Thursday.
BBC News saw evidence that private photos were still publicly available on the web server as of Thursday morning.
Jack’d is yet to issue a statement, or even notify affected users.
Source – bbc.com, arstechnica.com