Blur Exposes Information of 2.4 Million Users
Roughly 2.4 million Blur users had their information exposed online as a result of a misconfigured AWS S3 bucket, the application’s developer, online privacy company Abine, revealed this week.
Blur is a popular application that provides password management, masked email, and private browsing capabilities.
In a blog post published on Monday, Abine informed customers that some information of Blur users was potentially exposed. The information included email addresses, IP addresses used to access Blur, password hashes and, in some cases, first and last names and password hints.
“Importantly, there is no evidence that our users’ most critical data has been exposed, and we believe it is secure. There is no evidence that the usernames and passwords stored by our users in Blur, auto-fill credit card details, Masked Emails, Masked Phone numbers, and Masked Credit Card numbers were exposed. There is no evidence that user payment information was exposed,” Abine said.
The company’s representatives told SecurityWeek that roughly 2.4 million users were impacted by the security incident, which was the result of a misconfigured AWS S3 bucket used for data processing.
Abine said the exposed file stored information on users who had registered an account prior to January 6, 2018. The company became aware of the exposure on December 13.
While the company says the passwords were hashed using bcrypt with a unique salt for each user, it has still advised users to change their passwords.
“As a privacy and security focused company this incident is embarrassing and frustrating. These incidents should not happen and we let our users down. We apologize and are working very hard to ensure we respond quickly and effectively to this incident and make sure we do everything we can to not let anything like it happen again,” Abine said.