Location data of millions of users globally is revealed via apps without the consent of users or app makers.
Android and iOS apps have ads that stealthily trace precise user locations.
A hacker on the Russian breach forum XSS threatens to leak IP addresses, profile data, and more.
In a startling revelation, it was found that a location intelligence company, Gravy Analytics, was storing location information from thousands of apps globally. This was done through advertisements that reflected on apps that stored users’ locations.
Oddly enough, most app companies seemed unaware or oblivious to the location spying activities conducted using their platform. The massive location data infiltration scandal came to light when a hacker posted on the dark web that they stole data from Gravy Analytics.
Following this, researchers found a post on the Russian cybercrime forum XSS boasting about the data exfiltration from Gravy Analytics. The hacker claimed to have information including but not limited to IP, bssid, email, user agent, and profile.
Reacting to the amassing of location data, the hacker exclaimed, “They are really everywhere, and who supplies them with data.. You can’t even imagine a scheme using front companies…”privacy” reports but with stored, “deleted” or “masked”.”
The hacker threatened to publish the data on XSS within 24 hours if their demands were not met.
Taking cognizance of the gravity of the location data exposure, several data analysts, and cybersecurity experts jumped to the scene to investigate the truthfulness of the claim.
They found that the data stored by app stores did not have a time stamp. However, some samples indicated that they were from 2024. The Season 5 iteration of the mobile gaming app Call of Duty, launched in May 2024, was found in the list.
Upon enquiring, a few of the named companies replied. Muslim Pro denied knowing Gravy Analytics. However, it did mention the need to float ads on apps to keep the service free for users. Likewise, Tinder also denied having heard of Gravy Analytics.
Although it is claimed that the hacker stole the geolocation data from Gravy Analytics, it could not be said with certainty whether it collected or sourced information from its client companies. It is also suspected that threat actors used Google Ads to get location data.
The number of apps named in the location data heist is estimated to be over 12,000. Popular apps include Accu Weather, Super Fast VPN Proxy-Better, Chess, Capcut, Tinder, Moovit, Temple Run, Viber, and MyFitnessPal.
The list includes apps available on Android and iOS belonging to various categories. A few of them are as follows:
The list includes almost all the types of apps an app store could have in different languages, including VPNs that serve the purpose of hiding your online identity.
It is worth noting that a huge number of the apps were related to games, VPN, and recreation, pointing toward the intent of the culprit, who was looking to trace players across the globe.
Researchers found millions of mobile phone service coordinates in the U.S., Russia, and Europe.
Gravy Analytics accesses mobile phone location data received from its sources and sells to the US government and other companies.
In December 2024, the Federal Trade Commission banned a host of companies from accessing user location data. Some of these companies also worked with U.S. law enforcement agencies. The FTC banned Gravy Analytics and Venntel, its subsidiary, from selling, sharing, or accessing location data barring a few circumstances.
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: