NEWS
Data of 31 million Users of iPhone Add-on Keyboard ai.type Potentially Leaks
2408
2017-12-07
Posted by 3uTools

Data of 31 million Users of iPhone Add-on Keyboard ai.type Potentially Leaks


The Kromtech Security Center discovered on Tuesday that a MongoDB database used to collect data on ai.type keyboard users was misconfigured, and was available on the internet. Contained in the database is reportedly "data and details of 31,293,959 users" of the ai.type keyboard.

According to the researchers, user information includes phone numbers, full names, device name and model, mobile network name, SMS number, screen resolution, user languages enabled, Android version, IMSI number, IMEI number, emails associated with the phone, country of residence, links and the information associated with the social media profiles including birthdates and photos, IP, and location details.

Making the situation worse, it appears that 6.4 million records contained data gleaned from a user's Contacts, including names and phone numbers, leading to a total of 373 million records in the briefly publicly available database.

Data of 31 million Users of iPhone Add-on Keyboard ai.type Potentially Leaks


Other information in the database includes average messages per day, words per message, and ages of users.

"It is logical that anyone who has downloaded and installed the Ai.Type virtual keyboard on their phone has had all of their phone data exposed publicly online. This presents a real danger for cyber criminals who could commit fraud or scams using such detailed information about the user," said Kromtech's Head of Communications Bob Diachenko. "It raises the question once again if it is really worth it for consumers to submit their data in exchange for free or discounted products or services that gain full access to their devices."

Upon installation, ai.type asks for "Full Access." If permission is granted, the add-on keyboard can transmit absolutely anything typed through the keyboard to the developer. However, the company claims that it will never use personal information it collects —but if Kromtech is correct, the company appears to have stored a fair amount of information from the user's device anyhow.

Ai.type tells a different story about the data contained in the database —but does not deny that a database was available publicly for a period of time.

Speaking 
to the BBC, Chief Executive Eitan Fitusi says that the stolen information was a "secondary database." Additionally, he claims that the IMEI information was never collected by the company, user data collected only involves what ads are clicked by the user, and that the location data wasn't accurate.

Fitusi claims that the database has been secured since the breach.

The company that found the database, Kromtech, is the company that develops and sells the poorly regarded MacKeeper suite of applications.


Source: apple insider

Related Articles
Alibaba Pandora Lab Jailbreaks iOS 11.2 Successfully Rumor: Apple Blocks Activation on iOS 9.0-9.3.5 Firmware iCloud Bypass Bug Discovered in iOS 11 Apple Still Signing iOS 11.3 Beta 5/6, Downgrade to It to Jailbreak Your iPhone iOS 10.3 Jailbreak / iOS 10.3.1 Jailbreak How to Download Apple’s Official iOS IPSW with One Simple Step? Backup Your iOS Device When It's Disabled or in Password in Normal Mode Qihoo 360 Vulcan Team has Achieved iOS 11.3 Jailbreak