Researcher discovered TeenSafe stored thousands of kids’ Apple IDs in plaintext on an unprotected AWS server. The server has since been taken down. Credit: Thinkstock TeenSafe, a surveillance app that “more than one million” parents allegedly use to spy on what their kids are doing on their phones, failed to use a password to protect its servers, which resulted in over 10,000 records from the last three months being compromised.The mobile app claims to let parent monitor all sent, received, and deleted Android text messages and Apple iMessages, call logs, web browsing history, contacts, messages sent via Whatsapp and Kik Messenger, as well as device location and location history. Teensafe also claims to be a “secure” monitoring app, but that is not what security researcher Robert Wiggins, aka @Random_Robbie, found to be true.While scanning Amazon Web Services (AWS), Wiggins discovered two TeenSafe servers that were not protected with even so much as a password, meaning anyone could have accessed them. Although one server seems to have hosted only test data, the other unprotected server was cock-full of sensitive information.At least 10,200 records from the last three months had been exposed, although some were reportedly duplicates. ZDNet reported:The database stores the parent’s email address associated with TeenSafe, as well as their corresponding child’s Apple ID email address. It also includes the child’s device name — which is often just their name— and their device’s unique identifier. The data contains the plaintext passwords for the child’s Apple ID. Because the app requires that two-factor authentication is turned off, a malicious actor viewing this data only needs to use the credentials to break into the child’s account to access their personal content data.TeenSafe closes server, alerts customersTeenSafe yanked the server after being told the data was exposed. “We have taken action to close one of our servers to the public and begun alerting customers that could potentially be impacted,” TeenSafe told ZDNet.Wiggins said TeenSafe wasn’t even using “basic security measures, such as a firewall, to protect data.” The data was “unprotected and accessible by anyone without a password.” He told the BBC that his scan found other companies’ servers that contained the same mistakes of failing to protect data.While the exposed TeenSafe server with customer data did not include any saved photos or messages, it puts kids in a tight spot — the same kids who parents seem to think are not trustworthy when left to their own devices. Put another way by Cory Doctorow:If you’re the kind of parent who wants to spy on everything your kids do, you can force them to install an app like Teensafe, which only works if your kid doesn’t use two-factor authentication; you have to give it your kid’s device ID and password, so if that data leaks, it would allow anyone to break into your kid’s cloud and plunder all their private data.Not all kids are allegedly aware that their parents are using TeenSafe to monitor them. ZDNet noted that TeenSafe says, “It doesn’t require parents to obtain the consent of their children.” If that applies to you, TeenSafe-using parents, then you probably need to fess up while explaining why your kids need to change their Apple ID passwords. Then you and your teen can talk about potential phishing scams, since your email addresses were also exposed. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe