DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Shoot-the-Messenger, Monday edition: ActMobile threatens researcher whose only sin was trying to let them know they are leaking data

Posted on November 1, 2021 by Dissent

On October 12, researcher Bob Diachenko tweeted:

Since Fri I’ve been trying to get in touch with someone from ActMobile [@ActMobile] to responsibly alert that their VPN userbase (45M+) info (email, pwd, IPs, devices etc) is exposed to public but no luck. Incl. but not limited to @DashVPN, https://t.co/sdN3byHNcJ. Anyone?

— Bob Diachenko (@MayhemDayOne) October 12, 2021

Apparently he eventually got a response, but it was not what one would hope for. On October 30, Bob provided an update from ActMobile, claiming that “We do not maintain databases, so whatever is referenced is false. If  you write about us we will take action.”

And in pre-final, Halloween-ish twist of DashVPN/FreeVPN.org data exposure event… pic.twitter.com/RE4DzKq0Gx

— Bob Diachenko (@MayhemDayOne) October 30, 2021

As you might guess, the threat to “take action” against a whitehat researcher who had been trying to engage in responsible disclosure to no avail did not sit well with researchers and journalists who read Bob’s tweets (including this blogger, who has known Bob and collaborated with him occasionally since 2015 or so).

But Bob’s tweets also did not sit well with @Pompompur_in on Twitter, who took to his blog to reveal what he had discovered about the databases and leaks ActMobile had denied.  Pompompur_in writes (any typos are in the original):

Lets prove that Actmobile was indeed breached really quick, to clear any doubt some people might have. While being rude to a Whitehat security researcher after they disclose a critical flaw might not get your data leaked, he’s not the only one who found the server 🙂

Although Bob Diachenko would never leak data in retaliation for ActMobile or any entity not responding to responsible disclosure, Pompompur_in is not a whitehat researcher.

Pompompur_in then preceded to produce screencaps of the files he had found and exported, and the configuration of a MongoDB installation that appears to be ActMobile’s.  But then Pompompur_in really drives the point home, first quoting from ActMobile’s privacy policy in response to the question “What information do we collect?” and then providing data from a table:

“None, We do not collect any information of our users before, during, or even after using our app or service. We believe in 100% privacy for all our users.”

>Table “portal_api_device” has entered the chat.

The following is just one record from the table:

{“_id”:”ADV-9215fa99-2797-c071-1111-11111111″,”last_updated”:{“$date”:”2021-05-15T23:59:35.932Z”},”balance_bytes”:-1,”ip”:”85.109.223.89″,”app_id”:””,”fastest_region”:”EU”,”user_id”:{“$oid”:”57397471d3c41405b2c7bbde”},”recent_country_code”:”TR”,”os_version”:”1.0″,”latitude”:”00040.0000000000″,”app_version”:”3.032″,”license_state”:”spon”,”added”:{“$date”:”2016-02-25T12:02:01.260Z”},”ad_id”:null,”has_rolling_trial”:false,”is_active”:true,”last_notif_sent_ts”:-1,”_Device__dashboard_instructions”:”{}”,”longitude”:”00036.0000000000″,”device_name”:”etab5″,”vpn_ip”:”10.2.80.203″,”license_expiry_ts”:{“$numberLong”:”2528020353″},”model”:”Android Phone”,”os”:”android”}

Is that IP address, device name, and location data in there, too? Do people ever use their real names as part of device names? Isn’t at least some of that personal information?

You can read Pompompur_in’s full report and post on his blog.

Bob Diachenko has not released his own report yet, which will probably including a finer analysis of what kinds of data types and how many of each Bob found in the exposed data. He has already indicated that their 45+ million user database for VPN was exposed and that it contained emails and passwords.

As to ActMobile, they now have some additional problems to address, not the least of which is the fact that they didn’t respond to responsible disclosure to secure their data and they had what this site considers to be the incredibly bad judgement to try to threaten an established researcher. Yes, researchers can make mistakes (and so can journalists), but ActMobile’s response will likely infuriate consumers who read Pompompur_in’s or Bob’s reports, and consumer anger will likely lead to requests to regulators to investigate whether ActMobile has deceived the public or violated any data protection laws here or in the EU.

And since non-public communications suggest that the ActMobile data are already in a few people’s hands, so don’t be surprised if the data shows up on any leak site.

Updated 1:52 pm. It seems it has already been leaked on a popular forum. DataBreaches.net has reached out to ActMobile to request a statement or response and will update this post when one is received.

No related posts.

Category: Breach Incidents

Post navigation

← TN: Professional Healthcare Management discloses ransomware incident
Martin County tax collector still silent amid cyberattack, message to them posted on dark web →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.