Adult VR app leaked 20,000 users' sensitive data that could have allowed hackers to blackmail them

Adult VR app leaked 20,000 users' sensitive data that could have allowed hackers to blackmail them

According to the security experts, the flaw could have allowed hackers to download the personal details of every single SinVR customer with an account. The vulnerability could have also let hackers download the details of users who paid for content using PayPal.

The researchers said that they disclosed the flaw to SinVR, attempting to contact them via email, Twitter and Reddit but failed to hear back from them. However, around five days after the researchers first disclosed details about the problem to the firm, SinVR finally fixed the patch.

"Digital Interruption gave us ample warning before posting their findings and we fixed the issue as soon as it was revealed to us," a spokesperson for SinVR told Alphr. "We are in contact with them and they confirmed that the outlined security hole was closed. Altogether, it has been a tremendous learning experience, which will serve to enhance our security, and we are glad that it was conducted ethically.

"Moving forward, we are confident in our ability to stop similar attacks and will keep using a professional security service to audit our system. We are making sure that all 'back door' intrusions are fully consensual," the spokesperson added.

Although the flaws have now been fixed, it is still unclear whether any malicious entities accessed users' information while the app was still leaking data.

"As this is quite a lot of PII, not only could an attacker use this to perform social engineering attacks, but due to the nature of the application, it is potentially quite embarrassing to have details like this leaked. It is not outside the realm of possibility that some users could be blackmailed with this information," Digital Interruption researchers said in a blog.

Share this post

Submit to DeliciousSubmit to DiggSubmit to FacebookSubmit to Google PlusSubmit to StumbleuponSubmit to TechnoratiSubmit to TwitterSubmit to LinkedIn

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

back to top

More Cyber News