Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to Website Planet about a non-password-protected database that contained 820,750 records belonging to Lost and Found Software — a Germany based company offering lost and found tracking and return services for multiple airports in the US, Canada, and Europe.
I recently discovered a single publicly exposed database that was not password-protected or encrypted. Upon viewing records inside the database, it became clear that it was some type of lost and found tracking software system for the airline industry. Once I was confident I knew who the owner of the data was, I used the same name format of the exposed database and changed only the airport abbreviation based on the airports listed as customers using the software. By applying this method I was able to predict and identify a total of 14 databases. I discovered 10 databases that were publicly accessible and 4 that were restricted. The combined databases contained 820,750 records totaling 122 GB in size.
In a limited sampling of the exposed documents, I saw records and images indicating shipping labels, screenshots, reports, and lost items. These ranged from medical devices, computers, personal electronics, wallets, bags, antiques, and just about anything else you can imagine travelers taking with them on their flights. The most concerning files I saw in the database were a large number of high resolution images of identification documents such as passports, drivers licenses, employment documents, and more. It is not known if these images of identification documents were created to file claims and identify ownership of lost documents, or if these documents themselves were lost and copies were uploaded by airport staff or officials.
The chat files also contained a number of screenshots that included payment confirmations to have items returned, shipping labels, original receipts of lost products, and additional documents containing PII. The majority of the records were contained inside of folders labeled “user image and item image”.
The name of the database and the records inside it indicated that they belonged to Lost and Found Software — a German based software company that, according to their website, is designed to reduce the administrative workload, while improving service and increasing the return rate and customer satisfaction. I immediately sent a responsible disclosure notice to Lost and Found Software, and all of the identified 14 databases were restricted from public access and no longer accessible within hours of my notification.
The following day I received a reply to my responsible disclosure notice stating: “Thank you for bringing your security research to our attention. We have already taken initial steps to restrict public access to the information and are working on removing access to the specific files that were available until now”. Although the records belonged to Lost and Found Software, it is not known if the database was owned and managed directly by them or by a third-party contractor. It is also not known how long the database was exposed before I discovered it or if anyone else may have gained access to it. Only an internal forensic audit could identify additional access or potentially suspicious activity.
According to Lost and Found’s LinkedIn profile, the company provides image recognition technology that enables customer service to automate the registration of found items in real time. The image recognition system automatically identifies the type, color, and location where the item was found. The system can include details such as brand, serial numbers, or information on identification documents.
This image is a collage of redacted screenshots that show identification documents from around the world, which were exposed in the publicly accessible databases.
This screenshot shows what appears to be a claims summary that includes a description of a lost item. The claim also contains the owner’s PII, such as name, physical address, email address, phone number, and their driver’s license information.
This screenshot shows a lost and found report that includes the name and phone number of the traveler, details of the items, and the circumstances of how their property was lost.
This screenshot shows a notification that a traveler’s item had been found. The file also provided instructions on how to have their property returned by mail using a handling gateway.❮❯
×
Potential Risks
The exposure of passports, driver’s licenses, and other identification documents can provide criminals with valuable data that could hypothetically be used to commit identity fraud, open additional accounts in an individual’s name, or create counterfeit documents using the real identities or documents of travelers. Private identification data can be valued at over USD $1,000 on the dark web.
The insider knowledge of specific lost items could provide criminals with enough information to launch targeted scams on individual travelers. By posing as employees of a legitimate lost and found recovery service, malicious actors could request additional personal or financial information. The traveler would have little reason to doubt that the request is not legitimate, as theoretically only the traveler, airline, and lost and found recovery service would know exactly what was lost, when, and where. As an example, if a traveler had lost a high value item (like a personal computer) and it was never found, the criminal could say “we found your computer, I am confirming your personal information, provide me with your credit card number so we can return it back to you”. Using social engineering and insider information, the odds of a successful scam increase significantly.
I am not saying these individuals are at imminent risk of any targeted fraud or other scams, I am only describing a real world hypothetical scenario of how this information could potentially be used. Anyone who believes their data has been exposed should monitor their credit report and identity to ensure there is no suspicious activity and should never provide personal or financial details without verifying it is an official request via a formal communication channel.
When technology companies have multiple clients and multiple databases, it can be tempting to give them uniform names out of convenience. I would highly recommend against this method because using predictable names for databases greatly increases the cybersecurity risks. As an ethical security researcher, I was able to easily guess the existence of additional databases by changing only the name of the client airport while leaving the name structure of the database intact.
Cybercriminals use both manual and automated scanning for their attacks; if one database is exposed, it opens the entire network up to being targeted when names or formats are predictable. Even if one or more of the databases is secured, it is clear to the criminals what type of data is stored there and they can launch a wide range of potential attacks to gain unauthorized access. Alternatively, assigning each database a unique and independently derived name would isolate any potential data incident to a single database, as the others would not be easy to guess. I am not implying that Lost and Found Software faced these potential risks. I am only providing potential threat awareness for educational purposes as a hypothetical worst case scenario.
I would recommend companies that collect and store images and documents filter them by their sensitivity. An image of a suitcase or an iPad may not be as sensitive as images of a passport or a claims form with PII, and, correspondingly, they should be treated separately based on the degree of sensitive information contained within. Once data is identified as potentially sensitive, the relevant files should be encrypted. Additionally, to limit the risks of a future data exposure, companies should:
Implement enhanced authentication measures to prevent unauthorized access to sensitive records.
Give potentially sensitive data an expiration date, storing only necessary information for a limited time.
Conduct regular security audits and penetration testing, which may be able to identify public exposures and additional vulnerabilities.
This breach serves as a stark reminder of the real world potential risks associated with data protection measures when collecting and storing traveler information.
I imply no wrongdoing by Lost and Found Software dba getsteroo GmbH in Germany, any contractors, affiliates, or related entities. I do not claim that internal, traveler, or user data was ever at imminent risk. The hypothetical data-risk scenarios I have presented in this report are strictly and exclusively for educational purposes and do not reflect, suggest, or imply any actual compromise of data integrity. It should not be construed as a reflection of or commentary on any organization’s specific practices, systems, or security measures.
As an ethical security researcher, I do not download the data I discover. I only take a limited number of screenshots as necessary and solely for verification purposes. I do not conduct any activities beyond identifying the security vulnerability and notifying the relevant parties. I disclaim any and all liability for any and all actions that may be taken as a result of this disclosure. I publish my findings to raise awareness of issues of data security and privacy. My aim is to encourage organizations to proactively safeguard sensitive information against unauthorized access.
Jeremiah Fowler is a Security Researcher and co-founder of Security Discovery. Jeremiah began his career in security research in 2015 and has a mission of data protection. He has helped identify and secure the data of millions of people around the world. His discoveries have been covered in Forbes, BBC, Gizmodo, among others. Security and responsible disclosure are not only a passion, but a way of protecting our digital lives.
Thank you, - your comment was submitted successfully!
We check all user comments within 48 hours to make sure they are from real people like you. We're glad you found this article useful - we would appreciate it if you let more people know about it.
Share this blog post with friends and co-workers right now:
Thank you, , your comment was submitted successfully!
We check all comments within 48 hours to make sure they're from real users like you. In the meantime, you can share your comment with others to let more people know what you think.
Thank you for signing up!
Once a month you will receive interesting, insightful tips, tricks, and advice to improve your website performance and reach your digital marketing goals!