December 16, 2015 By Douglas Bonderud 2 min read

According to white-hat hacker Chris Vickery, Mac OS X utility app MacKeeper has dropped the ball by pushing 13 million personal account details onto servers that are fully available to anyone who runs a quick port search on Shodan.io.

As noted by CSO Online, software owners Kromtech claim they’ve now secured the databases and say they will “continue to take every possible step to protect the data of our customers from the evolving cyberthreats that companies both large and small face on a daily basis.” Pretty words, but actions speak louder. How did supposedly secure data end up on a publicly accessible server in the first place?

Dubious History

Do a search for MacKeeper and two major results come up. The first is security-related: In May 2015, MacKeeper faced a zero-day flaw related to its handling of custom URLs. If attackers could convince users to visit an exploit-hosting site, it was possible to leverage the app and run remote code on the victim’s computer.

The other search result? That the jury’s out about MacKeeper’s usefulness — much has been made about its reliance on pop-up ads, and many Apple forums lament the amount of effort required to remove the application from a Mac OS X system.

Now the company is under fire for leaving private data in plain sight, and while Kromtech’s official statement is quick to point out that no payment data was compromised since they process all transactions through a third party, this is small comfort for anyone who had his or her name, username, email address, street address and password hash made publicly available.

Account Details Laid Bare

So what happened, exactly? According to Vickery, he was bored one night and decided to run a random “port:27017” search on Shodan.io. The results were immediately apparent: MacKeeper’s database of account details, available for viewing without any type of security check, firewall or encryption.

While password data was hashed in the database, Vickery notes that the company used the long-outdated MD5 protocol and didn’t salt the passwords, making them easier to guess for a determined hacker. MacKeeper wasn’t alone, either: According to SecurityWeek, Vickery also found that social network Vixlet, video chat app OkHello and online gaming site Slingo also kept user data on fully open and unprotected servers.

After his discovery, Vickery posted his results to Reddit in hopes of getting Kromtech’s attention. He did, and now Kromtech says they’ve fixed the problem. The rest of the messaging is basically an assurance that things weren’t so bad because credit card data wasn’t stolen, but a mea culpa is nowhere to be found.

Beyond MacKeeper itself, there’s a larger issue: the notion that for data to have value, it must be financial in nature. Personal details are worrisome, sure, but at least they’re not financial. Public sentiment is rapidly swinging, however, since consumers expect solid data protection and will quickly gravitate toward businesses with proven track records of data — and database — security.

Bottom line? Hackers are well aware that account details are valuable. Companies that want to stay in business had better get on board and start protecting what they collect and treating personal info like financial gold.

More from

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

What’s up India? PixPirate is back and spreading via WhatsApp

8 min read - Quick recapThis blog post is the continuation of a previous blog regarding PixPirate malware. If you haven’t read the initial post, please take a couple of minutes to get caught up before diving into this additional content. As a reminder, PixPirate malware consists of two components: a downloader application and a droppee application, and both are custom-made and operated by the same fraudster group. Although the traditional role of a downloader is to install the droppee on the victim device,…

83% of organizations reported insider attacks in 2024

4 min read - According to Cybersecurity Insiders' recent 2024 Insider Threat Report, 83% of organizations reported at least one insider attack in the last year. Even more surprising than this statistic is that organizations that experienced 11-20 insider attacks saw an increase of five times the amount of attacks they did in 2023 — moving from just 4% to 21% in the last 12 months.With insider threats on the rise, it’s critical for businesses to recognize the real dangers that originate from inside…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today