Heimdal
article featured image

Contents:

Researchers discovered that the Tap Busters: Bounty Hunters app had left their database open to the public for at least five months, exposing users’ private conversations.

Additionally, sensitive data was hardcoded into the client side of the app, making it vulnerable to further leaks.

With over one million downloads on Google Play Store and more than 45,000 reviews, Tap Busters: Bounty Hunters has an idle RPG rating of 4.5 stars. 

In the game, players take on the role of bounty hunters trying to become masters of the galaxy. While traveling through different alien realms, players defeat villains and collect loot. Using idle game mechanics, players can move forward without constant input.

There were 349MB of unprotected data, including user IDs, usernames, timestamps, and private messages. If the data leaked had not been backed up and a malicious actor had chosen to delete it, it is possible that the user’s private messages would be permanently lost without a chance of recovery.

The developers left sensitive information hardcoded in the application’s client side, commonly known as secrets, along with an open Firebase instance.

Keys found were: fir ebase_database_url, gcm_defaultSenderId, default_web_client_id, google_api_key, google_app_id, google_crash_reporting_api_key, google_storage_bucket.

In most cases, reverse engineering can access sensitive data if it is hardcoded into the client side of an Android app.

No Response Was Given

Tilting Point, the company behind several other popular games with a large player base, created the game. Some of these games have received more than five million downloads. The app developer was notified of the data leak, but he did not disable public access to the database.

The app developers did not respond to questions from cybersecurity researchers about the duration of the instance’s public accessibility or the possibility that malicious actors could exploit hardcoded secrets, resulting in sensitive data breaches.

However, at the time of writing, the app’s firebase instance had so much data that threat actors were unable to acquire it all in a single run due to Google’s data transferring policies, effectively rendering the example as having a too large payload to be acted upon.

Android Apps That Aren’t Secure

Tap Busters: Bounty Hunters is one of the thousands of apps on the Google Play Store that data leaks could compromise.

Researchers examined over 33,000 Android apps earlier this year and discovered that the most sensitive types of hard coded secrets left exposed were API keys used to authorize projects, links to open Firebase datasets, and Google Storage buckets.

leaky android apps

Over 14,000 apps had Firebase URLs on their front end, according to research conducted by Cybernews. 

Six hundred of these were links to active Firebase instances. As a result, a malicious actor could access an app’s open database and potentially user data by examining its public information.

Health and fitness, education, tools, lifestyle, and business were the five app categories with the most hardcoded secrets.

How to Get Rid of Malware on Your Android Device

You may have clicked on a malicious link in a text message or installed a malicious app. Your device is now behaving strangely and is infected with a virus.

What are your options now?

You can always perform a factory reset, but remember that you will lose all your data. However, there are other steps you can take for a quick fix.

Step 1: Restart your phone in safe mode. 

You can access the Power Off options by pressing the power button on your phone. The power menu will be displayed. Hold the power Off button until the Reboot to Safe Mode option appears, then select OK.

Step 2: Uninstall any suspicious apps as well as those you no longer use.

You’re already aware of the importance of uninstalling apps that should never have been on your device in the first place, as well as old ones that provide no benefit.

Heimdal Official Logo
Your perimeter network is vulnerable to sophisticated attacks.

Heimdal® Network DNS Security

Is the next-generation network protection and response solution that will keep your systems safe.
  • No need to deploy it on your endpoints;
  • Protects any entry point into the organization, including BYODs;
  • Stops even hidden threats using AI and your network traffic log;
  • Complete DNS, HTTP and HTTPs protection, HIPS and HIDS;
Try it for FREE today 30-day Free Trial. Offer valid only for companies.

Step 3: Install a reliable anti-malware program.

It would be best if you did not rely solely on Google Play Protect. The Heimdal ® Threat Prevention Network operates at the DNS layer to prevent advanced and yet unknown threats from infiltrating your organization. You can detect advanced malware in your network, block malicious web content, protect against ransomware, phishing, identity theft, and other threats.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and YouTube for more cybersecurity news and topics.  

Author Profile

Gabriella Antal

SMM & Corporate Communications Officer

linkedin icon

Gabriella is the Social Media Manager and Cybersecurity Communications Officer at Heimdal®, where she orchestrates the strategy and content creation for the company's social media channels. Her contributions amplify the brand's voice and foster a strong, engaging online community. Outside work, you can find her exploring the outdoors with her dog.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE