{"id":24774,"date":"2024-06-27T09:10:07","date_gmt":"2024-06-27T17:10:07","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/06\/27\/news-18504\/"},"modified":"2024-06-27T09:10:07","modified_gmt":"2024-06-27T17:10:07","slug":"news-18504","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/06\/27\/news-18504\/","title":{"rendered":"Driving licences and other official documents leaked by authentication service used by Uber, TikTok, X, and more"},"content":{"rendered":"\n<p>A company that helps to authenticate users for big brands had <a href=\"https:\/\/www.404media.co\/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix\/\">a set of administration credentials exposed online<\/a> for over a year, potentially allowing access to user identity documents such as driving licenses.<\/p>\n<p>As more and more legislation emerges requiring websites and platforms\u2014like gambling services, social networks, and porn sites\u2014to verify their users&#8217; age, the requirement for authentication companies offering that service rises.<\/p>\n<p>You may never have heard of the Israeli based authentication company, AU10TIX, but you will certainly recognize some of its major customers, like Uber, TikTok, X, Fiverr, Coinbase, LinkedIn, and Saxo Bank.<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1051\" height=\"289\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/age_verification-customers.png?w=1024\" alt=\"Au10tix advertising the authentication and age verification for the world's leading brands\" class=\"wp-image-112978\" style=\"width:1200px;height:auto\" \/><\/figure>\n<p>AU10TIX checks users&#8217; identities via the upload of a photo of an official document. <\/p>\n<p>A researcher found that AU10TIX had left the credentials exposed, providing 404 Media with screenshots and data to demonstrate their findings. The credentials led to a logging platform containing data about people that had uploaded documents to prove their identity.<\/p>\n<p>Whoever accessed the platform could peruse information about those people, including name, date of birth, nationality, identification number, and the type of uploaded document such as a drivers\u2019 license, linking to an image of the identity document itself.<\/p>\n<p>Research showed that the likely source of the credentials was an infostealer on a computer of a Network Operations Center Manager at AU10TIX.<\/p>\n<p>Stolen credentials have shown to be a major source of breaches like those <a href=\"https:\/\/www.threatdown.com\/blog\/snowflake-breach-looks-like-165-individual-incidents\/\" target=\"_blank\" rel=\"noreferrer noopener\">recently associated with Snowflake<\/a>. Snowflake pointed to research which found that one cybercriminal obtained access to multiple organizations\u2019 Snowflake customer instances using stolen customer credentials.<\/p>\n<p>Another major problem is that these sets of credentials get traded and sold all the time. And it\u2019s not as if when you sold them once, that\u2019s it. Digital information can be copied and combined endlessly, leading to huge data sets that criminals can use as they see fit.<\/p>\n<p>We&#8217;ve talked about the <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/03\/data-brokers-admit-theyre-selling-information-on-precise-location-kids-and-reproductive-healthcare\">dangers of data brokers<\/a> in the past. The California Privacy Protection Agency (CPPA) defines data brokers as businesses that consumers don\u2019t directly interact with, but that buy and sell information about consumers from and to other businesses. There are around 480 data brokers registered with the CPPA. However, that might be just the tip of the iceberg, because there are a host of smaller players active that try to keep a low profile.<\/p>\n<p>Either way, for any company and particularly an authentication company working with sensitive data, having such an account accessible with just login credentials should be grounds for serious penalties.<\/p>\n<p>In a statement given to 404 Media, AU10TIX said it was no longer using the system and had no evidence the data had been used:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWhile PII data was potentially accessible, based on our current findings, we see no evidence that such data has been exploited. Our customers&#8217; security is of the utmost importance, and they have been notified.\u201d<\/p>\n<\/blockquote>\n<p>For now, there&#8217;s not much that individual users of the brands can do apart from keep an eye out for any official statements, and consider an ongoing <a href=\"https:\/\/go.cyrus.app\/MN4j\/fkkekmw9\">identity monitoring solution<\/a>. Below are some general tips on what to do if your data has been part of a data breach:<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-protecting-yourself-after-a-data-breach\">Protecting yourself after a data breach<\/h2>\n<p>There are some actions you can take if you are, or suspect you may have been, the <a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2023\/09\/involved-in-a-data-breach-heres-what-you-need-to-know\">victim of a data breach<\/a>.<\/p>\n<ul>\n<li><strong>Check the vendor&#8217;s advice.<\/strong> Every breach is different, so check with the vendor to find out what&#8217;s happened, and follow any specific advice they offer.<\/li>\n<li><strong>Change your password.<\/strong> You can make a stolen password useless to thieves by changing it. Choose a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/computer\/how-to-create-a-strong-password\" target=\"_blank\">strong password<\/a>&nbsp;that you don&#8217;t use for anything else. Better yet, let a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\" target=\"_blank\">password manager<\/a>&nbsp;choose one for you.<\/li>\n<li><strong>Enable two-factor authentication (2FA).<\/strong> If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\" target=\"_blank\">two-factor authentication (2FA)<\/a>&nbsp;can be phished just as easily as a password. 2FA that relies on a FIDO2 device can\u2019t be phished.<\/li>\n<li><strong>Watch out for fake vendors.<\/strong> The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify the&nbsp;identity of anyone who contacts you&nbsp;using a different communication channel.<\/li>\n<li><strong>Take your time.<\/strong> Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.<\/li>\n<li><strong>Consider not storing your card details<\/strong>. It&#8217;s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.<\/li>\n<li><strong>Set up identity monitoring.<\/strong> <a href=\"https:\/\/go.cyrus.app\/MN4j\/fkkekmw9\" target=\"_blank\" rel=\"noreferrer noopener\">Identity monitoring<\/a> alerts you if your personal information is found being traded illegally online, and helps you recover after.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"h-check-your-personal-data-exposure\"><strong>Check your personal data exposure<\/strong><\/h2>\n<p>You can check what personal information of yours has been exposed on our Digital Footprint portal. Just enter your email address (it\u2019s best to submit the one you most frequently use) to our\u00a0<a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">free Digital Footprint scan<\/a>\u00a0and we\u2019ll give you a report.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-7ba16f0b-04e8-4679-9512-2f21a0971dcf\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_fy25dfplaunch_171269600960&amp;utm_content=V1\"><\/a><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">SCAN NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/06\/driving-licences-and-other-official-documents-leaked-by-authentication-service-used-by-uber-tiktok-x-and-more\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Researchers have found an online repository leaking sensitive data, including driving licenses and other identity documents. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[31269,31589,10599,30956,30709,32,5897],"class_list":["post-24774","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-age-verification","tag-ao10tix","tag-authentication","tag-data-brokers","tag-info-stealers","tag-news","tag-privacy"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24774"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24774\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24774"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}