Update July 2, 2018:
Google has responded to our inquiry and a bit of discussion with a member of the Google Cloud team has cleared up a few of the questions surrounding this report.
Firebase databases are secure by default when they are created and all of these cases are instances where a developer hasn't followed best practices in one form or another. Google publishes a full guide on securing realtime databases with Firebase. Additionally, the Firebase admin console displays an unmistakable warning when a database has had the normal default protections removed and is configured to allow for public access.
Google also tells me that emails were sent to all insecure projects with complete directions on how to turn database security back on in December 2017. It's clear after speaking with a member if the Google Cloud team that Firebase is as safe as we all had thought it was and that issues like this are attributed to developer mistakes.
The original article appears below.
Firebase is a great service for any small developer who needs to have an online service at their disposal. It's powered by Google and the company goes out of its way to help developers use it in their mobile apps. You can see by simply watching any Google I/O session video about Firebase that developers actually cheer when the service is mentioned.
Apparently, some of those developers have hit a snag when it comes to configuring the database they may be using to store your data. After scanning 2.7 million apps, security researchers at Appthority say more than 113GB of data is available through over 2,200 Firebase databases to anyone who knows the right URL. In total, there are over 100 million personal records exposed.
Researchers found 28,500 apps that used Firebase to connect and store user details, of which 3,046 stored their data inside a misconfigured Firebase database that was readable through the use of a JSON URL scheme. The majority of the apps that use Firebase are for Android, but 600 apps that exposed data are for iOS. The problem is platform-agnostic, and the apps in question aren't the culprit here. It's simply the database configuration on the backend.
The information leaked contains:
- 2.6 million plaintext passwords and user IDs.
- 4 million+ PHI (Protected Health Information) records.
- 25 million GPS records.
- 50 thousand financial including Bitcoin transactions.
- 4.5 million Facebook, LinkedIn, corporate data-store user tokens.
Appthority informed Google about the database configuration and provided the list of affected apps before this report was published. We've reached out to see if Google has anything they would like to add and will update once it's received.
Appthority is no stranger to finding poorly configured online databases. Previously the company has found "critical" user data exposed through services like MongoDB, CouchDB, Redis, MySQL, and Twilio.
We may earn a commission for purchases using our links. Learn more.
Here's why Google probably won't release a 'true flagship Pixel' next March
Google is really bad at keeping secrets and one this big is no exception. Sorry, but you're going to be waiting until next October for any new "flagship" Pixel phone.
These are the very best Android TVs you can buy in 2020
Android TV is a sleek and powerful smart TV operating system, and these TVs ship with it built right in. Here are the best Android TVs you should consider and why they're so great!
Remembering Google Play Music: A mixtape for my favorite streaming service
After years of calling the service dead, it finally happened. Google's original music service has shut down, and I believe the best way to process that grief and emotion is through another age-old musical tradition: the mixtape.
Download all the things with the best microSD cards for the Shield TV
Did you just get your hands on the new NVIDIA Shield TV (2019) and are disappointed with the current storage situation? Thankfully, NVIDIA opted to include a built-in microSD card slot for you to expand that storage and keep all of your content at the ready.