Another online fitness tracking app is giving up sensitive information – but this time, it is revealing the names and home locations of government personnel.
Permissive search capabilities in Polar Flow, an online tracking app by Finnish fitness wearables company Polar, has enabled researchers to pinpoint highly sensitive military and intelligence operatives and quickly find out where they live. Furthermore, until Polar shut the app down it was possible to download gigabytes of this information automatically.
Foeke Postma, a volunteer at open source intelligence collective Bellingcat, originally discovered the issue and contacted Dutch news site De Correspondent, who dug into it further. The flaw lay in the way that Polar Flow displayed the details of users’ workouts over several years and allowed people to search for them.
The web app displayed icons in a geographic area of the visitor’s choicer, indicating exactly where someone had worked out. Clicking on an icon revealed the details that the person had registered in the app along with all their other workout locations.
The researchers could use that information to find workout routes that began and ended at the same residential address to pinpoint where they lived.
They also used this technique to identify workouts near sensitive sites such as military bases, detention centres, intelligence offices and nuclear weapons sites. They could then identify employees by name and search their other workouts to find their homes.
Even when people had marked themselves private in the app or registered with a fake name, the reporters were still able to find their identities. Polar Flow still exposed a unique identifying number, and allowed public searches using that ID.
The app revealed all their logged activity to anyone who searched, enabling the reporters to quickly track down the private individual’s home address. From there, a quick public record search revealed their real name.
Searching en masse
Because Polar Flow embedded search queries in web URLs, the reporters were able to create scripts that assembled URLs with their choice of search parameters and sent them to the Polar Flow server directly, bypassing browser-based searches altogether.
They did this en masse, searching individual segments of the map using combinations of GPS coordinates, for all periods since 2014, in three-month chunks. Its automatic script targeted over 200 sensitive locations to produce a list of 60,000 workouts by 6,460 users.
They then programmed another automatic search, querying each of these users’ profile pages and asking for their other workout locations. The application spat out several gigabytes of data – and let the reporters simply download it.
From there, it would have been a relatively simple task to find each person’s frequent workout locations and narrow down their address. Instead, they were responsible and turned the information over to Polar.
According to ZD Net, Polar responded that its systems had not been breached. The company sent it the following statement:
Currently the vast majority of Polar customers maintain the default private profiles and private sessions data settings and are not affected in any way by this case. While the decision to opt-in and share training sessions and GPS location data is the choice and responsibility of the customer, we are aware that potentially sensitive locations are appearing in public data and have made the decision to temporarily suspend the Explore API.
The concern is, of course, that someone else may have accessed this information publicly already. It was a clear example of ‘light leakage’, in which a seemingly innocuous social tool can become the perfect doxxing tool.
Not the first fitness tracker leak
Bellingcat’s Postma began looking into Polar Flow after reading about another fitness app, Strava. This app revealed sensitive locations late last year as part of its Global Heat Map, which was a global map of workout activity – including those at military bases.
Source : Naked Security