Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Numerous Applications Using Google’s Firebase Platform Leaking Highly Sensitive Data

Posted on September 25, 2025September 25, 2025 By CWS

Quite a few cell functions have been discovered to show essential consumer data via misconfigured Firebase companies, permitting unauthenticated attackers to entry databases, storage buckets, Firestore collections, and Distant Config secrets and techniques.

This widespread subject first got here to mild when safety researcher Mike Oude Reimer revealed findings on 16 September 2025, demonstrating that roughly 150 totally different Firebase endpoints in top-ranked cell apps had been accessible with none authentication.

These exposures ranged from consumer credentials and personal messages to high-privilege API tokens, underscoring a systemic weak spot in how builders configure Firebase safety guidelines.

Within the weeks following the preliminary disclosure, ice0 analysts recognized a surge in automated scanning instruments exploiting this vulnerability, with attackers harvesting hundreds of thousands of information in bulk.

These instruments depend on extracting Firebase challenge IDs from app APK recordsdata or identified naming conventions, then probing numerous service endpoints for open permissions.

Though Firebase warns builders that test-mode configurations expire after 30 days, many groups prolong these insecure guidelines or inadvertently go away manufacturing environments in check mode.

The result’s an expansive assault floor that miscreants can exploit with minimal effort, jeopardizing each enterprise and shopper knowledge.

The affect extends past trivial sources corresponding to public pictures or non-sensitive flags.

At scale, uncovered storage buckets have contained hundreds of thousands of consumer ID images, cleartext passwords, and even AWS root entry tokens.

In a single occasion, a storage bucket belonging to an app with over 100 million downloads was found internet hosting consumer ID images, permitting attackers to compile huge id databases.

Equally, misconfigured Realtime Databases revealed personal chat logs and geolocation data, whereas Distant Config endpoints uncovered personal API keys for third-party companies.

ice0 analysts famous that many of those leaks went unreported or had been dismissed as non-issues till full datasets had been downloaded and inspected.

The next part explores the an infection mechanism leveraged by scanning instruments to enumerate and exploit Firebase companies, specializing in APK extraction, endpoint discovery, and unauthenticated knowledge retrieval.

An infection Mechanism: APK Evaluation and Endpoint Enumeration

Scanning instruments like OpenFirebase start by parsing Android Bundle Package (APK) recordsdata to extract Firebase challenge IDs, API keys, and Google App IDs from the compiled res/values/strings[.]xml and bundled google-services[.]json.

These identifiers function the first inputs for setting up service URLs. For instance, to retrieve a Realtime Database, the scanner points a easy GET request appending [.]json to the endpoint:

curl – s https[:]//PROJECT_ID-default-rtdb[.]firebaseio[.]com/[.]json

If the response returns HTTP 200 OK and JSON content material, the database is flagged as public. In circumstances the place the database resides in a unique area, the preliminary request returns a JSON error containing the right regional endpoint, which the instrument makes use of to reissue the request.

Two-step lookup ensures complete protection (Supply – ice0)

This two-step lookup ensures complete protection with out brute-forcing each attainable area variation.

For Distant Config, scanners extract each the google_api_key and google_app_id from strings[.]xml earlier than setting up a POST request to the Distant Config API:

curl – s – X POST
– H “Content material-Sort: software/json”
– d ‘{“appId”:”GOOGLE_APP_ID”,”appInstanceId”:”any”}’
“https[:]//firebaseremoteconfig[.]googleapis[.]com/v1/tasks/PROJECT_ID/namespaces/firestore[:]fetch”

A profitable 200 OK response containing configuration knowledge or secrets and techniques confirms unauthenticated entry to Distant Config entries.

Some configurations embody the NOTEMPLATE error when no config exists, permitting scanners to distinguish between protected and empty endpoints.

By automating APK decompilation with instruments like JADX and iterating via Firestore assortment names—both extracted from code references or guessed by way of wordlists—attackers can enumerate public Firestore cases.

Github token (Supply – ice0)

A question to a non-existent assortment returns an empty JSON array somewhat than an authentication error, signaling vulnerability with out prior information of assortment names.

This an infection mechanism, combining APK metadata extraction with focused API calls, highlights how minimal data disclosure can result in full knowledge leakage. Organizations counting on

Firebase should implement strict safety guidelines, audit test-mode expirations, and take away hardcoded keys to forestall these automated assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Applications, Data, Firebase, Googles, Highly, Leaking, Numerous, Platform, Sensitive

Post navigation

Previous Post: Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed
Next Post: Cisco Patches Zero-Day Flaw Affecting Routers and Switches

Related Posts

New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials Cyber Security News
Chrome 140 Released With Fix For Six Vulnerabilities that Enable Remote Code Execution Attacks Cyber Security News
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges Cyber Security News
Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites Cyber Security News
New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face Cyber Security News
Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News