Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Blur Exposes Information of 2.4 Million Users

Roughly 2.4 million Blur users had their information exposed online as a result of a misconfigured AWS S3 bucket, the application’s developer, online privacy company Abine, revealed this week.

Blur is a popular application that provides password management, masked email, and private browsing capabilities.

Roughly 2.4 million Blur users had their information exposed online as a result of a misconfigured AWS S3 bucket, the application’s developer, online privacy company Abine, revealed this week.

Blur is a popular application that provides password management, masked email, and private browsing capabilities.

In a blog post published on Monday, Abine informed customers that some information of Blur users was potentially exposed. The information included email addresses, IP addresses used to access Blur, password hashes and, in some cases, first and last names and password hints.

“Importantly, there is no evidence that our users’ most critical data has been exposed, and we believe it is secure. There is no evidence that the usernames and passwords stored by our users in Blur, auto-fill credit card details, Masked Emails, Masked Phone numbers, and Masked Credit Card numbers were exposed. There is no evidence that user payment information was exposed,” Abine said.

The company’s representatives told SecurityWeek that roughly 2.4 million users were impacted by the security incident, which was the result of a misconfigured AWS S3 bucket used for data processing.

Abine said the exposed file stored information on users who had registered an account prior to January 6, 2018. The company became aware of the exposure on December 13.

While the company says the passwords were hashed using bcrypt with a unique salt for each user, it has still advised users to change their passwords.

“As a privacy and security focused company this incident is embarrassing and frustrating. These incidents should not happen and we let our users down. We apologize and are working very hard to ensure we respond quickly and effectively to this incident and make sure we do everything we can to not let anything like it happen again,” Abine said.

Advertisement. Scroll to continue reading.

Related: Amazon S3 Bucket Exposed GoDaddy Server Information

Related: AWS Adds New Feature for Preventing Data Leaks

Related: Robocalling Firm Exposes U.S. Voter Records

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.

Register

People on the Move

Retired U.S. Army General and former NSA Director Paul M. Nakasone has joined the Board of Directors at OpenAI.

Jill Passalacqua has been appointed Chief Legal Officer at autonomous security solutions provider Horizon3.ai.

Cisco has appointed Sean Duca as CISO and Practice Leader for the APJC region.

More People On The Move

Expert Insights