Cybersecurity Researcher, Jeremiah Fowler, found and reported to vpnMentor a couple of non-password-protected database that contained practically 2.7 billion information belonging to Mars Hydro — a China-based firm providing IoT develop lights and software program functions that permit customers worldwide to regulate gadgets, timers, and settings remotely.
The publicly uncovered database was not password-protected or encrypted. It contained 2,734,819,501 information with a complete measurement of 1.17 TB. There have been folders contained in the database indicating logging, monitoring, and error information for IoT (Web of Issues) gadgets bought worldwide. In a restricted sampling of the uncovered paperwork, I noticed 13 folders with over 100 million information containing SSID (service set identifier), extra generally generally known as your Wi-Fi community identify. Other than these Wi-Fi community names, the information additionally included passwords, IP addresses, system ID numbers, and rather more. These seemed to be particulars of related IoT gadgets in addition to references to the management system (smartphone) operating the IoT software program software, indicating particulars in regards to the working techniques (e.g., iOS, Android).
Upon additional analysis, the information indicated they belonged to a California-registered firm referred to as LG-LED SOLUTIONS LIMITED. The uncovered information additionally contained API particulars and URL hyperlinks to LG-LED SOLUTIONS, Mars Hydro, and Spider Farmer. These firms manufacture and promote develop lights, followers, and cooling techniques for agricultural functions. Lots of the information I noticed had been labeled as “Mars-pro-iot-error” or “SF-iot-error”. Along with the SSID credentials, the error logs included doubtlessly delicate data like tokens, app model, system kind, and IP addresses. In keeping with an inventory on the ecommerce web site Made in China, Mars Hydro is a LED develop gentle producer that develops, produces, and manufactures merchandise in Shenzhen, China. The corporate has warehouses in the UK, United States, and Australia.
I instantly despatched a accountable disclosure discover to LG-LED SOLUTIONS and Mars Hydro. Inside hours the database was restricted from public entry and not publicly accessible. Though I didn’t obtain any reply to my preliminary accountable disclosure notification, in a follow-up electronic mail to Mars Professional’s buyer assist, I inquired whether or not the corporate and the app are related or whether or not the applying was developed by a 3rd occasion. I obtained a reply stating: “This app is the official product of Mars Hydro”.
Though I obtained affirmation that the app is an official product, it isn’t presently recognized if the database was owned and managed straight by LG-LED SOLUTIONS or through a third-party contractor. It is usually not recognized how lengthy the database was uncovered earlier than I found it or if anybody else gained entry to it. Solely an inside forensic audit may establish further entry or doubtlessly suspicious exercise.
The Mars Professional software is obtainable for each iOS and Android gadgets and provided in English, French, German, and Chinese language. In keeping with the Mars Hydro knowledge privateness notices on each Google Play and Apple’s App retailer that the app collects no consumer knowledge, so it’s unclear how the log information include particulars of connectivity and credentials. One risk could possibly be that they’re captured and recorded by the IoT gadgets as soon as they’re related to the consumer’s native community. Regardless of how this data was collected, it raises potential considerations over IoT system safety and community privateness. The Mars Professional app’s knowledge privateness coverage hyperlinks to the LG-LED SOLUTIONS in addition to the Android software.apk file on Mars Hydro’s official web site.
IoT safety (or lack of safety) is a severe concern. Many gadgets weren’t designed with knowledge safety as a major focus or with long-term patch administration options. In a menace report printed by Palo Alto Networks, researchers discovered that, throughout all industries, an estimated 57% of IoT gadgets had been thought-about extremely weak — and much more surprising is that 98% of information transmitted by these gadgets is unencrypted. The research additionally discovered that 83% of related gadgets run unsupported or outdated working techniques, leaving them open to assaults utilizing recognized vulnerabilities. Many IoT gadgets have restricted processing capabilities that restrict the flexibility to implement further security measures, encryption instruments, or set up necessary safety or firmware updates.
One other concern is that many IoT gadgets use default credentials. This will add one other layer of vulnerability just because the common customers would not have the technical abilities wanted to vary the default passwords to one thing extra advanced. Worst of all, some IoT gadgets haven’t any authentication — as soon as they’re related to the community, they’re fully weak to assaults.
Lastly, the place does all of this knowledge go? When consumer knowledge is saved in a centralized cloud server, it creates a single level of failure that would doubtlessly expose large quantities of consumer and system knowledge within the occasion of a knowledge breach.
Customers of apps and gadgets have change into extra conscious of the potential dangers within the wake of the latest information surrounding TikTok. The app’s capacity to trace customers’ behaviors and entry metadata, system identifiers, and particulars about Wi-Fi networks have raised privateness and potential nationwide safety dangers. There’s a actual concern that consumer knowledge could possibly be accessed by overseas governments underneath nationwide safety legal guidelines and used for surveillance or intelligence gathering.
Primarily based on the interior logs that I noticed on this uncovered database, the Mars Professional related gadgets and software additionally collect a wealth of data. The hypothetical worst case situation can be if this data was used for surveillance, man-in-the-middle (MITM) assaults, mapping of networks and significant infrastructure, or different potential misuse. I’m not stating nor implying that these firms are engaged in any of those actions or that their customers are in danger. I’m not claiming that simply because an software was made in China or has Chinese language possession there’s an imminent danger. I’m solely highlighting what knowledge is collected and the way it could possibly be a possible safety danger within the unsuitable palms. Along with cyber dangers, there’s a danger in actual life {that a} malicious actor may impersonate the consumer and manipulate gadgets comparable to lights, followers, or temperature controls, doubtlessly inflicting hurt to crops. I solely present real-world danger eventualities for instructional functions based mostly on knowledge that’s publicly accessible.
There are documented instances of distant community intrusions that spotlight the dangers of utilizing unsecured Wi-Fi as an entry level. In November 2024, it was reported that Russian army hackers from the GRU’s Unit 26165, also called APT28 or Fancy Bear, used a little-known methodology referred to as “nearest neighbor assault” to breach a company based mostly in Washington, D.C. that was targeted on supporting Ukraine. The hackers compromised a close-by group’s community that was merely in vary of the goal’s Wi-Fi after which gained entry to the sufferer’s community. This methodology allowed the attackers to remotely exploit Wi-Fi networks from 1000’s of miles away.
The “nearest neighbor assault” methodology gives a transparent understanding of how cybercriminals and nationstates may doubtlessly assault targets by figuring out a weak hyperlink and easily leaping to close by networks. The truth that these close by networks are often recognized or trusted makes the detection of this sort of assault rather more troublesome if they aren’t actively monitored for suspicious exercise.
There are severe potential dangers of uncovered Wi-Fi SSID and credentials. On this discovery, I noticed a large quantity of uncovered SSID names, passwords, MAC addresses, and consumer IP addresses that would doubtlessly permit unauthorized distant entry to the system’s Wi-Fi community. Theoretically, utilizing the uncovered credentials, an attacker may hook up with the community and compromise different gadgets or try a nearest neighbor assault. As soon as related to the system, it could possibly be potential to intercept knowledge or harvest packet sniffing knowledge. Packet sniffing refers to knowledge packets which can be transmitted between related gadgets and the community; these packets are captured and analyzed to assemble data that may also be used to steal further login credentials, establish delicate recordsdata, or different confidential knowledge. One other potential danger can be to focus on the system straight, set up malware, customized exploits to recognized vulnerabilities within the firmware model, or hijack the system for use in a botnet for DDoS assaults.
To mitigate these dangers, IoT system makers and app builders ought to keep away from logging delicate data like Wi-Fi passwords in plain textual content. Error and monitoring logs present necessary data and are sometimes not handled as delicate knowledge. It is a severe problem when these logs additionally include ancillary data comparable to system identifiers, authorization credentials or different buyer data. Doubtlessly delicate knowledge ought to all the time be encrypted or, at a minimal, the identifiable system data ought to be changed with hashed or tokenized values.
Moreover, inside cloud storage repositories ought to be restricted to not permit public entry and set off an alert when an unauthorized entry is detected. Gadget makers also needs to have a long run plan on preserve safety updates and patch administration. Lastly, they need to additionally conduct common audits and penetration assessments to establish vulnerabilities earlier than they’re exploited or end in a knowledge breach.
I suggest no wrongdoing by LG-LED SOLUTIONS, Spider Farmer, Mars Hydro, or any of its contractors or associates. I don’t declare that inside knowledge or consumer knowledge was ever at imminent danger. The hypothetical data-risk eventualities I’ve offered on this report are solely for instructional functions and don’t mirror any precise compromise of information integrity. It shouldn’t be construed as a mirrored image of any group’s particular practices, techniques, or safety measures.
As an moral safety researcher, I don’t obtain the information I uncover. I solely take a restricted variety of screenshots solely for verification functions. I don’t conduct any actions past figuring out the safety vulnerability and notifying the related events. I disclaim any accountability for any and all actions that could be taken on account of this disclosure. I publish my findings to lift consciousness on points of information safety and privateness. My purpose is to encourage organizations to proactively safeguard delicate data towards unauthorized entry.
Ely Rodriguez