Los Angeles-based electric car-sharing provider Blink Mobility left a misconfigured MongoDB database open to the public. Its metadata was then indexed by search engines and discovered by Cybernews researchers on October 17th.
The investigation revealed that the database contained more than 22,000 users with 181,000 records, mostly about car rentals.
The database included the personally identifiable information of Blink Mobility customers and administrators, including:
Cybernews researchers reported the incident to the company the same day it was discovered, and two days later, the database was no longer accessible.
“Anyone with any MongoDB viewer could have accessed the public-facing database. If malicious actors were to discover it first, they could infiltrate such a leak, locking the data and demanding ransom. Hopefully, our team was the first to notice and warn the company. However, the exposed individuals must take some precautions, as their data was briefly in the wild,” Cybernews researchers write.
Cybernews reached out to Blink Mobility for additional comments but did not receive a response before publishing the article.
Blink Mobility offers a clean and convenient transportation solution, with 40 locations around Los Angeles to pick up and drop off electric vehicles and a car charging service.
Personally identifiable information from car renting companies is highly valued among black-hat hackers and is often sold in batches on cybercrime marketplaces on the dark web.
The exposed information could enable malicious actors to carry out identity theft, phishing attacks, unauthorized access to users’ accounts, and other nefarious actions.
“In the wrong hands, this data can be exploited for financial gain. Threat actors could potentially use the exposed information to track users’ movements, manipulate bookings, and engage in fraudulent activities, emphasizing the critical need for robust cybersecurity measures to safeguard user privacy and prevent potential misuse,” Cybernews researchers warn.
They recommend immediately terminating any active sessions on the device by logging off from the service, changing passwords, and making sure there are no reused passwords on multiple accounts. Additionally, users are advised to enable multi-factor authentication wherever possible.
Exposed individuals should stay vigilant by regularly monitoring their accounts for any suspicious activity, avoiding interaction with phishing attempts, and refraining from clicking any unfamiliar links sent via SMS or email.
While it’s unclear what caused this leak, Cybernews researchers suggest that administrators double-check the obvious cyber hygiene checklists.
Additional details are available in the original post at @
About the author: , Senior Journalist at CyberNews
Follow me on Twitter: and and Mastodon
(SecurityAffairs – hacking, Blink Mobility)