Android voice chat app leaves database unprotected, leaks private user data: Report 

OyeTalk, a popular Android voice chat app, left its database unprotected exposing private user data and conversations 

Published - February 22, 2023 04:02 pm IST

OyeTalk a social audio platform with over 5 million downloads on Google Play Store, left its database open to the public exposing users’ private data and conversations.

OyeTalk a social audio platform with over 5 million downloads on Google Play Store, left its database open to the public exposing users’ private data and conversations. | Photo Credit: Reuters

OyeTalk, which describes itself as a social audio platform with over 5 million downloads on Google Play Store, left its database open to the public exposing users’ private data and conversations, a report from cybernews shared.

Data was found to be leaking through unprotected access to Firebase, Google’s mobile application development platform. It is used to provide cloud-hosted database services.

More than 500MB of data comprising unencrypted users chats, usernames and cell phone International Mobile Equipment (IMEI) numbers was exposed.

Additionally, sensitive hardcoded data on the client side of the app including Google API (application programming interface), which is unsafe as it can be easily accessed through reverse engineering, was also reported.

(For top technology news of the day, subscribe  to our tech newsletter Today’s Cache)

The practice of hardcoding data on the client side has in the past led to successful exploitation by threat actors.

And though the app developers failed to close public access when informed of the leak, since Google’s security measures do not allow large datasets to be downloaded in on go, the leak was stopped from its end, the report shared.

The recent data leak is not the first to affect OyeTalk app, and its database was previously discovered and marked as vulnerable to leaks by unknown actors.

The database contained specific fingerprints used to make open Firebases, which demonstrates that the database lacks proper authentication for viewing data and authorisation for inserting or editing existing data, the report shared.

Earlier, last month, an Android role-playing game, Guidus, leaked data of some 100,000 users due to similar vulnerabilities in how it was storing data. A similar vulnerability was also reported in Tap Busters: Bounty Hunter, another Android role-playing game app.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.