The web-development
browser Blisk suffered a data breach leaking more than 2.9 million records
through an open Elasticsearch database that was left open and that bypassed the
security put in place by its users.
The browser has
been compromised in a way that it now leaks the data it was designed to gather
from web development teams, UX designers and web engineers, according to Noam
Rotem and Ran Locar, leaders of VPNMentor’s security team, who uncovered the
problem. Blisk has been operating since 2014 and VPNMentor said it has NASA,
Microsoft, Apple, eBay and UNICEF as its customers and others from around the
world.
The
information exposed included more than 1,000 email addresses – including a
ca.gov email address, IP addresses and user agent details. All of which can be
used to create legitimate appearing phishing emails to be used against the
customers.
Rotem and
Locar said Blisk intentionally set up its browser without any security layer at
all, and it also bypassed any security implemented by its users.
“Since the
browser ‘sees’ what the user sees, it can potentially bypass every encryption,
2-factor authentication, and any other measure they have in place. If the user
is using software that is not heavily secured, this can lead to very serious
security breaches. It appears that no matter what security measures you put in
place while using Blisk, your data would still potentially be leaked,” the researchers said.
The open database
was found on December 2, 2019, the vendor was contacted two days later and had
taken action to protect in the information on December 9.