Breach, Data Security

14 million Key Ring users exposed in open database

A misconfigured Amazon Web Services S3 bucket has exposed the data of about 14 million users of the popular Key Ring app that includes some payment and medical card information.

The database was discovered by vpnMentor’s Noam Rotem and Ran Locar who found 44 million records were open to public viewing. Key Ring is generally used to upload and store scans and photos of retail loyalty membership cards so they can be accessed by a smartphone, but the research team found many people have used to hold copies of their of IDs, driver licenses, government IDs, medical insurance cards, medical marijuana ID cards, credit cards and even NRA club membership cards.

In addition to the S3 bucket containing this information, vpnMentor found four other open Key Ring databases exposing different sets of data.

The open buckets were first spotted in January, but may have been open for a longer period of time, the research team said. Key Ring was informed of the issue on February 18, after vpnMentor had made sure it had the details properly confirmed, and the databases were locked down or taken offline on February 20.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.