December 16, 2015 By Douglas Bonderud 2 min read

According to white-hat hacker Chris Vickery, Mac OS X utility app MacKeeper has dropped the ball by pushing 13 million personal account details onto servers that are fully available to anyone who runs a quick port search on Shodan.io.

As noted by CSO Online, software owners Kromtech claim they’ve now secured the databases and say they will “continue to take every possible step to protect the data of our customers from the evolving cyberthreats that companies both large and small face on a daily basis.” Pretty words, but actions speak louder. How did supposedly secure data end up on a publicly accessible server in the first place?

Dubious History

Do a search for MacKeeper and two major results come up. The first is security-related: In May 2015, MacKeeper faced a zero-day flaw related to its handling of custom URLs. If attackers could convince users to visit an exploit-hosting site, it was possible to leverage the app and run remote code on the victim’s computer.

The other search result? That the jury’s out about MacKeeper’s usefulness — much has been made about its reliance on pop-up ads, and many Apple forums lament the amount of effort required to remove the application from a Mac OS X system.

Now the company is under fire for leaving private data in plain sight, and while Kromtech’s official statement is quick to point out that no payment data was compromised since they process all transactions through a third party, this is small comfort for anyone who had his or her name, username, email address, street address and password hash made publicly available.

Account Details Laid Bare

So what happened, exactly? According to Vickery, he was bored one night and decided to run a random “port:27017” search on Shodan.io. The results were immediately apparent: MacKeeper’s database of account details, available for viewing without any type of security check, firewall or encryption.

While password data was hashed in the database, Vickery notes that the company used the long-outdated MD5 protocol and didn’t salt the passwords, making them easier to guess for a determined hacker. MacKeeper wasn’t alone, either: According to SecurityWeek, Vickery also found that social network Vixlet, video chat app OkHello and online gaming site Slingo also kept user data on fully open and unprotected servers.

After his discovery, Vickery posted his results to Reddit in hopes of getting Kromtech’s attention. He did, and now Kromtech says they’ve fixed the problem. The rest of the messaging is basically an assurance that things weren’t so bad because credit card data wasn’t stolen, but a mea culpa is nowhere to be found.

Beyond MacKeeper itself, there’s a larger issue: the notion that for data to have value, it must be financial in nature. Personal details are worrisome, sure, but at least they’re not financial. Public sentiment is rapidly swinging, however, since consumers expect solid data protection and will quickly gravitate toward businesses with proven track records of data — and database — security.

Bottom line? Hackers are well aware that account details are valuable. Companies that want to stay in business had better get on board and start protecting what they collect and treating personal info like financial gold.

More from

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today