securitywithsam.com
Open in
urlscan Pro
104.26.10.7
Public Scan
Submitted URL: https://securitybysam.com/
Effective URL: https://securitywithsam.com/
Submission: On July 14 via automatic, source certstream-suspicious — Scanned from DE
Effective URL: https://securitywithsam.com/
Submission: On July 14 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to content Security with Sam by Sam Jadali * About Sam | * DataSpii Report | * DataSpii FAQ | * Impacted Companies | * Press | * Contact * * Back * Twitter * Email DATASPII: THE CATASTROPHIC DATA LEAK VIA BROWSER EXTENSIONS (SUMMARY) Click here to read about Sam Click here to read the full DataSpii report. Click here to download the DataSpii indicator (IOC) file Click here to view the DataSpii-identified extensions Click here to read about Hover Zoom’s controversial past Imagine if someone could see what employees at thousands of companies were actively working on in near real-time (about a one-hour delay). Imagine, further, this person could access your sensitive personal data in much the same way. Moreover, what if you and/or your colleagues were, yourselves, unknowingly leaking such data? DataSpii (pronounced data-spy) denotes the catastrophic data leak that occurred via eight Chrome and Firefox browser extensions (see Table 1). This leak exposed personal identifiable information (PII) and corporate information (CI) on an unprecedented scale, impacting millions of individuals. The collected data was then made available to members of an unnamed service, which we refer to in our report as Company X. Both paid and trial members of this service had access to the leaked data. After we reported our findings to Google and Mozilla, the browser vendors remotely disabled the extensions. Furthermore, the online service is now defunct. Table 1. Chrome and Firefox extensions identified in the DataSpii leak. Note: There may be other, yet unidentified, invasive browser extensions involved in the DataSpii leak. Extension nameNumber of usersBrowser vendorChrome extension ID (if applicable)Hover Zoom800,000+ usersChromenonjdcjchghhkdoolnlbekcfllmednblSpeakIt!1.4+ million usersChromepgeolalilifpodheeocdmbhehgnkkbakSuperZoom329,000+ usersChrome and FirefoxgnamdgilanlgeeljfnckhboobddoahblSaveFrom.net Helper†≤140,000 usersFirefoxN/AFairShare Unlock‡1+ million usersChrome and FirefoxalecjlhgldihcjjcffgjalappiifdhaePanelMeasurement‡500,000+ usersChromekelbkhobcfhdcfhohdkjnaimmicmhcboBranded Surveys‡8 usersChromedpglnfbihebejclmfmdcbgjembbfjneoPanel Community Surveys‡1 userChromelpjhpdcflkecpciaehfbpafflkeomcnb †The invasive data collecting behavior occurred when the SaveFrom.net Helper extension was installed from the author’s official website using Firefox on macOS or Ubuntu. We did not observe the invasive behavior when the extension was installed from a browser vendor store. ‡FairShare Unlock, PanelMeasurement, Branded Surveys, and Panel Community Surveys make explicit efforts to let their users know they collect browser activity data. Company X members could search the website traffic data for nearly any domain name and find confidential corporate memos, zero-day security vulnerabilities, as well as impacted users’ tax returns, GPS locations, travel itineraries, credit card details, or possibly any URL he or she may have opened with their browser. By requesting data for a single domain via the Company X service, we were able to observe what staff members at thousands of companies were working on in near real-time. The Company X website states they collect their data from millions of opt-in users; however, we spoke with many impacted individuals and major corporations who have told us they did not consent to such collection. DataSpii impacted tech giants — including Apple, Facebook, Microsoft, and Amazon; DataSpii also impacted cybersecurity giants — including Symantec, FireEye, Trend Micro, and Palo Alto Networks. See Table 2 for a list of impacted companies and leaked data types provided by Company X to its members. Based on our research, billions of analytics hits were collected from impacted users and corporations. When impacted users use browser sync features (e.g., Google Chrome Sync), the extensions can instantly spread to all logged-in locations of a user, (e.g., home and work computers). Moreover, by monitoring the web traffic of a domain under our control, we observed third-party visits to the unique URLs collected by the extensions. Note: We have sent disclosures and notified all of the companies listed by our report. The list below is by no means a complete list of corporations impacted by the DataSpii leak. Table 2. DataSpii-impacted services and/or companies. Note: The data was published via Company X or it was made accessible by clicking the link provided by Company X. We did not click on any links except of our own. TABLE 2: IMPACTED COMPANIES Impacted companiesLeaked data made accessible via Company X. 23andMeShared 23andMe reportsAlienVaultJIRA data from alienvault.atlassian.netAmazon Web ServicesAWS S3 query string authentication parametersAmerican AirlinesPassenger information including: First name, last name, flight confirmation numberAmgenLAN network data collected from visitor(s) on the amgen inc. ISP networkAppleLast 4 digits of credit cards used for Apple product orders, credit card type, store used to pickup an Apple order, first and last name of the Apple order customer, iCloud Email addresses Shared iCloud Photos including iOS user first and last name.AthenaHealthLAN network data collected from visitor(s) on the athenahealth ISP networkAtlassianNear real-time data of corporate issues and employee-assigned tasks from thousands of atlassian.net subdomains.Blue OriginJIRA data hosted on blueorigin.com domain, originating from visitor(s) city listed as: Kent, WashingtonBuzzFeedJIRA data from buzzfeed.atlassian.netCapitalOneZoom meeting URLs from capitalone.zoom.usCardinalHealthJIRA data from cardinalhealth.atlassian.netDellZoom meeting URLs from dell.zoom.usDrChronoPatient names, names of medicationEpic SystemsLAN network data collected from visitor(s) on the epic systems corporation ISP networkFacebookFacebook Messenger attachments including tax returnsFireEyeJIRA data hosted on fireeye.com domain, originating from visitors on the fireeye, inc. ISP networkIntuitQuickbooks invoicesKaiser PermanenteLAN network data collected from visitor(s) of kaiser foundation health plan ISP network KareoPatient namesMerckLAN network data collected from visitor(s) on merck and co. inc. ISP networkMicrosoft OneDriveFiles shared on OneDrive including tax returnsNBCDigitalJIRA data from nbcdigital.atlassian.netNestShared Nest security camera clipsNetAppZoom meeting URLs from netapp.zoom.usOracleZoom meeting URLs from oracle.zoom.usPalo Alto NetworksLAN network data collected from visitor(s) of Palo Alto Networks ISP networkPfizerLAN network data collected from visitor(s) of pfizer inc. ISP networkRedditJIRA data from reddit.atlassian.netRocheLAN network data collected from visitor(s) on hoffmann laroche inc. ISP networkShopifyImpacted by AWS S3 query string parameter leakSkypeShared Skype chat URLsSouthwest AirlinesPassenger information including: First name, last name, and flight confirmation number Members of Company X can see these users checking-in in near real-time. Such data can be used to modify a flight, cancel a flight, or stalk the person, etc.SpaceXLAN network data collected from visitor(s) on the space exploration technologies corporation ISP networkSymantecLAN network data collected from visitor(s) on the symantec corporation ISP networkTeslaLAN network data collected from visitor(s) on the tesla inc. ISP networkTmobileJIRA data from tmobile.atlassian.netTrend MicroJIRA data collected from visitors on a non-publicly resolvable trendmicro.com subdomain.UberPassenger pickup and drop-off locations for impacted users that booked rides via m.uber.com, Zoom meeting URLs from uber.zoom.usUCLAZoom meeting URLs from ucla.zoom.usUnder ArmourJIRA data from underarmour.atlassian.netUnited AirlinesPassenger last names and their flight confirmation numbersWalmartZoom meeting URLs from walmart.zoom.usZendeskSupport ticket attachments, which (via HTTP referer) can even further be refined by the Zendesk client, (e.g., Venmo).Zoom Video CommunicationsZoom meeting URLs After we informed a browser vendor that one of its extensions was implicated in data collection, the vendor remotely disabled the extension for all users. While the extension did, indeed, cease performing its primary function, its collection of data continued unabated. Based on this observation, we recommend impacted users remove the extension in question from their browsers. During the course of our investigation, we observed two popular extensions (i.e., Hover Zoom and SpeakIt!) employ dilatory tactics — an effective maneuver for eluding detection — to collect the data. The extensions waited, on average, 24 days before initiating the collection of browsing activity data. We discovered the collection and dissemination of sensitive data from the internal networks of many Fortune 500 corporations (see Table 2 above for a complete list of impacted companies). In addition, we devised a local area network (LAN) experiment, which allowed us to observe one extension, Hover Zoom, collect hyperlinks stored within the page content of our LAN website. Such data collected from a single visit to a page in a LAN environment can be used to map a corporation’s LAN environment. Furthermore, we observed the dissemination of our LAN data to three different hostnames. The collected data included our site’s LAN IP address, hostname, page title, timestamp of the visit, as well as the URLs of page resources (i.e., CSS files, JS files, and images) referenced in our HTML code. We then observed much of our LAN data being disseminated to members of Company X. (Company X did not provide all collected metadata (e.g., last-modified) available to its customers.) Finally, through the responsible disclosure process, we corroborated our findings with impacted individuals and major corporations. Security with Sam, Proudly powered by WordPress.