DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Incidents

Android App OyeTalk Voice Chat App Leaks Private User Chats and Data

February 23, 2023
Reading Time: 2 mins read
in Incidents

 

A recent investigation by cybersecurity researchers has revealed that OyeTalk, a voice-chat app with over five million downloads on the Google Play Store, left its database open to the public, exposing private data and conversations. The open Firebase instance exposed over 500MB of data, including unencrypted user chats, usernames, and International Mobile Equipment Identity (IMEI) numbers.

IMEI numbers are unique identifiers assigned to factory-built mobile phones and other devices with cellular connection capabilities. Hardcoded sensitive information, such as Google API keys and links to Google storage buckets, was found in the application’s client side, which can be easily accessed through reverse engineering.

The discovery of the OyeTalk data leak raises privacy concerns for voice-chat app users. If the leaked data had not been backed up, users’ private messages could have been lost permanently. Moreover, the leakage of IMEI numbers on every message sent constitutes a massive privacy intrusion, as it associates the message permanently with a specific device and its owner. Threat actors could exploit this information to impose ransom.

This incident highlights the importance of secure coding practices for mobile applications. Hardcoding sensitive data in the client side of an Android app is risky, as it has been successfully exploited by threat actors in other apps, resulting in data loss or complete takeover of user data stored on open Firebases or other storage systems.

The app developers were informed of the data leak but failed to close public access to the database. However, Google’s security measures managed to close off the instance, notifying that the dataset was too large to download in one go.

 

Read More
Tags: AndroidData BreachData exposedFebruary 2023Google Play StoreincidentsIncidents 2023OyeTalk
0
VIEWS
ADVERTISEMENT

Related Posts

LockBit Ransomware Targets Sheriff’s Office

LockBit Ransomware Targets Sheriff’s Office

March 31, 2023
NCB Management Services reports data breach

NCB Management Services reports data breach

March 31, 2023
Misconfigured Microsoft app allowed attacks

Misconfigured Microsoft app allowed attacks

March 31, 2023
Hacking group tied to Russia & Belarus

Hacking group tied to Russia & Belarus

March 31, 2023

More Articles

Alerts

Vendors Actively Bypass Security Patch for Year-Old Magento Vulnerability

January 18, 2023
Tool

XM Cyber: Cloud Security Posture Management

March 29, 2022
Quotes

“Be a little suspicious. A very large…”

October 18, 2020
Quotes

“There needs to be a fundamental shift in…”

October 27, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.