DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

OkHello is NOT OK – they’re leaking user data (UPDATE 2)

Posted on December 6, 2015 by Dissent

OkHello provides a free group video chat service. Its app is available on the App Store and on Google Play. If you’ve ever used it, your details may be in others’ hands right now.

According to their Privacy Policy, OkHello collects a lot of personal information about users, including geolocation data and information from Facebook if you use Facebook Connect to access their service.

Of concern, a lot of that personal information appears to have been inadequately secured, and at this point, DataBreaches.net does not know for how long personal details have been exposed or how many people may have downloaded them.

Earlier today, white-hat researcher Chris Vickery informed DataBreaches.net that 2,627,082 users’ account details have been exposed. No passwords or authentication are needed to view and download user details that include first and last names, password hash, Facebook IDs, phone number, email address, messages, and friends’ information. The screencaps below were taken from the database and were redacted by Chris. The second one – with the personal message – came from a table that has 8.2 million entries.

okhello_DB_screenshot

Room_message_sample

Chris says he discovered the leak because OkHello failed to secure their database on a port that is indexed by Shodan.

Not only could Chris access the database through that port, but he discovered that OkHello also has a web page that allows anyone to download the entire database backup without any login required. DataBreaches.net went to the IP address Chris provided and verified that the entire database – more than 9 GB – could be downloaded without any password.

In its privacy policy, OkHello claims to care about its users’ information security:

Keeping your information safe: OkHello cares about the security of your information, and uses commercially reasonable safeguards to preserve the integrity and security of all information collected through the Service. However, OkHello cannot ensure or warrant the security of any information you transmit to OkHello or guarantee that information on the Service may not be accessed, disclosed, altered, or destroyed.

Attempts to Notify Failed

Chris attempted to contact OkHello through their support portal yesterday, but received no response.  OkHello has no phone number on their web site and their domain registration is protected. DataBreaches.net sent an alert to [email protected] this afternoon, but has received no response as yet. DataBreaches.net also attempted to reach their external counsel through Twitter to see if they could call them, and actually called the law firm’s Los Angeles office, only to be told by the weekend receptionist that he had no way of knowing who represented them and they wouldn’t be calling anyone.

While DataBreaches.net usually does not reveal a leak until after the entity has had time to secure it, in researching this incident, DataBreaches.net discovered that the leak had  already been disclosed on Twitter by Jay Fuller, who also tried (unsuccessfully, it seems) to reach OkHello through their Twitter account.

Would this be an appropriate time to remind everyone that I have repeatedly called for sites to be required to provide a dedicated and monitored phone number or email address that can be used to alert them to security breaches?

In the meantime, if anyone knows any of the principals of OkHello and can pick up the phone and call them to tell them to secure their database, that would be nice.

Update Dec. 8: As of this morning, OkHello’s backup database is still freely available. I haven’t checked their current installation, but they haven’t responded to attempts to alert them. Tweets to the California Attorney General, OkHello’s external counsel, and FTC do not seem to have resulted in anyone contacting them to address this leak, which includes personal messages.

Update Dec. 14: OkHello’s live MongoDB database is still up and still leaking.

Update Dec. 15: See this post for what happened next.


Related:

  • John P. Meehan Agency was hacked in July 2024. Affected customers were first finding out in November 2025.
  • Ransomware blog claims New Horizons Medical has been attacked
  • FTC Takes Action Against Education Technology Provider for Failing to Secure Students’ Personal Data
  • Data breach hits 'South Korea's Amazon,' potentially affecting 65% of country’s population
  • 'Trickery and f...ery': Agency under fire over senior manager's 'serious' privacy breach
  • Little Rock Psychologist Indicted by Federal Grand Jury for Defrauding Medicare and Arkansas Blue Cross Blue Shield
Category: Breach IncidentsBusiness SectorExposureOf NoteU.S.

Post navigation

← Ashley Madison hack steals man’s job, wife — and mind
Tunecore Has Been Hacked, Sensitive Data Revealed, All User Passwords Invalidated →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ANNOUNCE: A new resource to help small and mid-sized HIPAA-regulated entities
  • Askul says 740,000 sets of data breached in cyberattack
  • Google and Apple roll out emergency security updates after zero-day attacks
  • Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data
  • Virginia Urology Silent on Possible Data Breach as Purported Patient Data Begins to Leak
  • Village of Golf Manor considering paying ransom amid cyberattack (1)
  • Teen who allegedly stole millions of personal data records arrested in Spain
  • Akira ransomware: FBI tallies 250 million in payouts
  • IE: HSE confirms second ransomware attack but ‘no evidence’ patient data was stolen
  • Examining impact of federal relief program after major healthcare cyberattack — Research Brief

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Slovenian officials weaponize data-privacy laws against investigative journalism
  • End-of-Year 2025 State and Federal Developments in Minors’ Privacy
  • Tool allows stealthy tracking of Signal and WhatsApp users through delivery receipts
  • Oh Great, Smart Glasses That Record Everything You Say
  • CBP Agents Held This U.S. Citizen for Hours Until He Agreed To Let Them Search His Electronic Devices

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.