Instagram’s Lax Privacy Practices Let A Trusted Partner Track Millions Of Users’ Physical Locations

By   ISBuzz Team
Writer , Information Security Buzz | Aug 09, 2019 05:09 am PST

It has been revealed that Instagram’s lax privacy practices let trusted partner Hyp3r track millions of users’ physical locations, secretly save their stories, and flout its rules. Hyp3r used four key tools to scrape data from Instagram users. First, it utilized an Instagram security hole that allowed it to “zero in on specific locations” and collect all the posts made from those locations. Second, Hyp3r “systematically saved users’ public Instagram stories,” again utilizing that location data. Third, it “scraped public user profiles on a broad basis, collecting information like user bios and followers, which it then combined with the other location information.” Lastly, Hyp3r used image recognition software on user posts to analyze that the images included.

Full Story Here: https://9to5mac.com/2019/08/07/instagram-ad-partner-hyp3r/

Subscribe
Notify of
guest
5 Expert Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Patrick Hunter
Patrick Hunter , Sales Engineering Director, EMEA
August 12, 2019 9:02 pm

There are several things on the table here, and they are not really cyber security related. Firstly, there is the ethical side to the scraping of data from Instagram. Remember, this was perfectly allowed by Instagram until Facebook (the owner) fell afoul of the Cambridge fiasco. Instagram has changed its rules, but is that enough? The data was still being collected because Instagram did not understand, track or otherwise care about the 3rd parties using the API into their data. Where is the duty of care to its consumers? I doubt any Instagram user was aware or would be willing to allow their locations and other personal information to be tracked by an outside party.

Secondly, there is the implication of GDPR. EU citizens’ data can only be used for the purpose of which permission has been granted, nothing more. Now, there may be a check box hidden away that grants Instagram to use the data for other purposes, but is that opting in or out? Tracking citizens activities and locations and using that data to advertise is one thing, but what happens when that third party is hacked or the data is otherwise abused… Who is liable for the fines? I suspect Instagram and therefore Facebook need to be a lot clearer and more careful on what their third-party partners are doing with their data.

And lastly there is the configuration issues. Lax security around access in one of the most commonly used backdoors to allow hackers in. In this case it was a trusted 3rd party, but the net result is the same. Instagram didn’t do the right things, they didn’t lock the doors and they certainly weren’t checking either. This data has been possibly leaking for over a year. Any third-party access to sensitive data should be tracked and monitored. Any accounts and passwords used should be locked away and only requested when needed. These actions tend to stop the configuration issues dead in their tracks but this is not to say that configs shouldn’t be routinely checked. Especially after a policy change, in the case of Instagram.

Last edited 4 years ago by Patrick Hunter
Eoin Keary
Eoin Keary , CEO and Cofounder
August 12, 2019 8:38 pm

This could be a violation of GDPR if there is EU citizens data being collected using the app. Harvesting of EU citizens’ data without permission is a violation of the directive, and we are starting to see organisations being fined significant amounts of money for ignoring privacy rights and not making the necessary steps to protect their users’ personal information.

People also need to understand that if an app is free to use, the product is the user. The majority of social media apps and networks leverage individuals’ data as a commodity, that’s their business model, we should not forget that. Hyp3r’s scraping of data is unethical and probably illegal, but Instagram should be held accountable for allowing such a loophole to exist in the first place.

Last edited 4 years ago by Eoin Keary
Stuart Sharp
Stuart Sharp , VP of Solution Engineering
August 9, 2019 1:33 pm

Whilst a new attack vector is an interesting warning to all organisations – and an illustration of the ingenuity of man – for many organisations this is just another issue they need to worry about. Attacks like these are particularly concerning as they are so difficult to detect and can prove to be detrimental if executed successfully. These attacks are certainly viable as they require low powered devices that can be activated remotely, meaning they can withstand transit for many days without losing power. Organisations should be extra vigilant when accepting packages and refrain from leaving empty boxes within the confines of the business.

Last edited 4 years ago by Stuart Sharp
Gavin Millard
Gavin Millard , VP of intelligence
August 9, 2019 1:22 pm

This attack method isn’t new and has been leveraged by pen testers for many years, and not just warshipping but also ‘leave behind.’ It’s a reminder of the risks rogue assets and other unexpected devices on the network poses.

\”Having robust authentication methods on WiFi connections as well as an effective network access control solution will mitigate attack methods like warshipping, but It’s critical that organisations reduce their time to discover all new devices that appear on the network, categorise and assess them for vulnerabilities, and remove any that deviate from security policies.

Last edited 4 years ago by Gavin Millard
Felix Rosbach
Felix Rosbach , Product Manager
August 9, 2019 1:13 pm

Even if scraping publicly available data seems unlikely to be illegal under US law, there is still a risk that people are losing trust. Any organization processing consumer data should be very careful when sharing that data with third parties or making it publicly available. Sensitive data, even data sets that don’t seem to be identifiable information at first sight, always needs to be protected.

There is not only the risk of a breach. Data might also be stitched together and/or used in an inappropriate way by simply allowing third parties to access it – due to misconfiguration or lax oversight. While large Tech-firms seem to have an easier job when it comes to customer loyalty – other companies might lose valuable customers and therefore market share.

Last edited 4 years ago by Felix Rosbach

Recent Posts

5
0
Would love your thoughts, please comment.x
()
x