TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hacking Grindr Accounts with Copy and Paste

458 pointsby snowwolfover 4 years ago

33 comments

Nextgridover 4 years ago
&gt; we believe we addressed the issue before it was exploited by any malicious parties<p>I wonder how they are sure of this.<p>In their logs, there would be no difference between a legitimate password reset and a malicious one, given that even a legitimate flow would result in an initial request from some IP address, then when the user receives the email with the reset link they will most likely click on that from the same computer, thus the same IP address showing up on the logs. In case of a malicious attempt the same pattern would be seen - there is no way for them to know whether the user obtained the reset token from the e-mail (as they should) or directly from the password reset endpoint itself.
评论 #24667624 未加载
评论 #24667642 未加载
评论 #24668618 未加载
评论 #24667724 未加载
评论 #24667922 未加载
评论 #24667977 未加载
评论 #24668240 未加载
评论 #24668208 未加载
评论 #24667789 未加载
DevX101over 4 years ago
If your company is being actively targeted by nation states (and rest assured, Grindr is), you should have a serious security team where this sort of stuff shouldn&#x27;t have seen the light of day.<p>I&#x27;m not exaggerating when I say this bug may have gotten people locked up, or been the lever for corporate&#x2F;government espionage.
评论 #24670221 未加载
评论 #24668056 未加载
评论 #24668782 未加载
评论 #24669713 未加载
offtop5over 4 years ago
Considering Egypt is using apps like this to persecute LGBT people, this is absolutely horrifying.<p>I&#x27;m so glad I&#x27;ve gone social media free, all the big players in this space have shown repeatedly they don&#x27;t care about the safety of their users. Grindr was already caught sharing HIV status information with 3rd parties. Eventually these horrible companies will be regulated, but tons of people are going to be harmed before that happens.
评论 #24673672 未加载
erichurkmanover 4 years ago
Back when I reported a Grindr security flaw (2016), I couldn&#x27;t find them on any of the bounty sites, security@grindr.com bounced, and support failed to route it correctly.<p>Reaching out to their CTO, who I found on LinkedIn, and firstname.lastname@grindr.com got a reply in 8 minutes.<p>Sad to see they still haven&#x27;t upped their security game.
hiharryhereover 4 years ago
That’s appalling<p>Bug bounties are are well and good, but a basic pen test would have picked that up. They aren’t that expensive and for a business trading in data that can get you killed in some parts of the world, should be mandatory.
评论 #24667995 未加载
maybeanewoneover 4 years ago
My understanding -<p>Grindr doesn&#x27;t store your chat history, so logging in on a new device won&#x27;t show your old chat messages. Phew.<p>Grindr is particularly bad at security. It was fairly easy to triangulate users locations until fairly recently and some users were being harassed, and grindr ignored their reports for a long time.<p>It was also fairly easy to use fake locations until fairly recently which was also causing problems for non-users.<p>Grindr regularly shuts down accounts with no process. It&#x27;s very easy to lose your contacts.<p>Grindr lies about what information they retain. They claim to hold very little information, which they provide when your account is shut down. However they must retain a list of your blocks and favorites in order to function. They lie and say they don&#x27;t retain this info.<p>Because of the nature of their service, they should be on top of all this stuff, but they are really bad at it.
评论 #24668953 未加载
013aover 4 years ago
This issue is incredibly strange and severe.<p>One thing I did notice, though: The timestamps on the Twitter DMs, which were used as evidence to assert that they&#x27;re unresponsive in DMs, cover a time period of 90 minutes. The language the twitter client is set to is also not english (maybe French? the original discovery was made by someone who lives in France. I don&#x27;t know), which introduces the possibility that it wasn&#x27;t even daytime in the US when those were sent.<p>I&#x27;m all for publicly announcing these things (in a responsible way) and forcing a quicker response from the company, and its also likely that Troy tried to reach out on his own, but I just think that screenshot is a bad example of a company not responding to DMs. If it had been 48 hours to a week, then I&#x27;d be in the concerned camp.
评论 #24668381 未加载
评论 #24669210 未加载
评论 #24668438 未加载
sebmellenover 4 years ago
Wow, password reset tokens returned directly in-browser; that&#x27;s hard to believe. I wonder how long this had been going on?
评论 #24668848 未加载
评论 #24668203 未加载
评论 #24668905 未加载
评论 #24667522 未加载
评论 #24668356 未加载
ojosilvaover 4 years ago
&gt; Hey, do you have a Grindr account?<p>&gt; Lol<p>I can understand this is most probably a private lol by a surprised. But how about we at least stop making these are you gay? Lol! a public moment worth screenshooting?<p>An Ashley Madison data leak is a national embarrassment whereas a Grindr one, a &quot;national security threat&quot; [1]. Being on AM is just a vaudevillian indiscretion, being on Grindr is bro lol that feeds hate and wrecks lives.<p>[1] <a href="https:&#x2F;&#x2F;www.theverge.com&#x2F;interface&#x2F;2019&#x2F;3&#x2F;28&#x2F;18285274&#x2F;grindr-national-security-cfius-china-kunlun-military" rel="nofollow">https:&#x2F;&#x2F;www.theverge.com&#x2F;interface&#x2F;2019&#x2F;3&#x2F;28&#x2F;18285274&#x2F;grindr...</a>
评论 #24667797 未加载
评论 #24670907 未加载
评论 #24668129 未加载
kbos87over 4 years ago
I’m not an engineer, but I can say that for a very long time Grindr felt like it was basic, poorly built, and generally unreliable. A couple of years ago it felt like there was a serious wave of investment in the app - the UI got better, it stopped dropping messages and having random outages - but clearly the DNA of the company hasn’t really changed.
perardiover 4 years ago
OK, I know it’s easy to say “well of course it’s not safe, don’t send nudes and don’t go on sketchy hookups”. But, to paraphrase Drag Race: men are rotted gila monsters. <i>(I’m a gay male, I can say that. Also I speak from experience. I&#x27;ve seen things you people wouldn&#x27;t believe.)</i><p>So, as a thought exercise, how do you make an app like this more secure? Harm reduction is the name of the game. What are the best practices for this? Is it 2FA? Is it encryption keys linked to one device? Is it copying principles from Signal? Is it just having competent developers?
评论 #24667572 未加载
评论 #24668317 未加载
评论 #24670622 未加载
评论 #24668037 未加载
Traubenfuchsover 4 years ago
I have very little trust in the capabilities and interest of the Grindr team to do anything but making money with overpriced subscriptions. It&#x27;s riddled with bugs, years old, yet they keep adding new, unnecessary features like video chat to justify their insanely priced &quot;unlimited&quot; subscription.<p>This year there have been a few months where your own profile data would not load, making you think you&#x27;d lost your profile data and having to create it all again. Yet all you needed to do was to restart the app ~10 times to get it to load.<p>Sometimes messages just... get lost in the ether.<p>The &quot;online now&quot; notification is flaky.<p>Grindr Online (web browser) is a whole new mess. I haven&#x27;t used it in a long while, but the first months it felt as &quot;professional&quot; as an interns side project. Also you need to keep Grindr open on the phone while using it, kind of beating the purpose.<p>The setting to use the metric system still resets to imperial regularly.<p>The app is full of fakers, yet they still have no identity validation feature.
djaqueover 4 years ago
I guess the good news is that it requires knowledge of the user&#x27;s email address to execute. You can&#x27;t just run it on random people (emails aren&#x27;t disclosed) and even if you know someone on the app in real life, chances are good that they use a personal address that you won&#x27;t have.<p>Still a pretty bad vulnerability and pretty awful that grindr was ignoring it.
评论 #24667469 未加载
评论 #24667466 未加载
darepublicover 4 years ago
A startup I worked for had this exact same security issue. I brought it up to the tech lead&#x2F;CEO but they were in denial about it. Handrolled password reset by dummies basically
评论 #24668084 未加载
评论 #24668766 未加载
gentlewaterover 4 years ago
I&#x27;ve been on Grindr for years, and I know first hand that their support is as bad as it can get. _Seriously_. I know because they also have a big automated ban problem. In trying to fight their bot issue, they&#x27;ve started auto-banning accounts that trigger their filter in some way or another. I&#x27;ve been banned 4 times without cause. Each time you have to contact support, who seemingly are either unable or not allowed to answer with anything other than canned responses. Three times the support person realized the ban was erroneous and lifted it without further ado. One time the person affirmed it, all while refusing to break from the canned responses or provide any justification. Most frustrating experience I&#x27;ve ever had with a digital service.
helios_invictusover 4 years ago
As far as I can tell Grindr has had crappy security and a willful negligent response to security concerns for its entire existence. Don&#x27;t forget that location tracking in real time of people with Grindr. Don&#x27;t use Grindr.
评论 #24668560 未加载
brundolfover 4 years ago
This will continue to happen as long as companies aren&#x27;t given any reason to care. The incentives simply don&#x27;t work out, and I highly doubt the market will ever change that at this point.
ve55over 4 years ago
It would be nice if this level of negligence and incompetence was somehow punished so that it stopped happening so often
beaker52over 4 years ago
I&#x27;ve fixed this exact vulnerability (sans QR code) for a client of mine in the last 2 years. I place the cause for these kinds of issues on the split between &quot;frontend&quot; and &quot;backend&quot; developers, with many frontend developers coming out of code camps able to build client-side rendered single page applications and being very proficient in JavaScript but not having experience with aspects of security-related software design. Back in the olden days, coming through learning PHP which was all server-side, you got a lot more exposure to that. Less so with these React-heavy code camps.
评论 #24672120 未加载
8bitsruleover 4 years ago
That &#x27;bug&#x27; is <i>so</i> stupid and elementary that I&#x27;m disinclined to think it&#x27;s a bug. If they had <i>any</i> security people, it&#x27;d never have existed. So ... they just don&#x27;t <i>give a shit</i>. Surprise?
评论 #24668073 未加载
davewritescodeover 4 years ago
I’ve worked on these types of features and this is egregiously bad. Where I work, we won’t even tell you the full email address that we’re sending the password reset to.
w_t_payneover 4 years ago
All you need to do is buy a seat on a RTB exchange and you can already collect pretty much all the information you need without having to hack anything.<p>Our digital infrastructure is <i>ludicrously</i> insecure and open to abuse. The stable door is wide open, and has been for over a decade.
a-dubover 4 years ago
I&#x27;m not even sure I&#x27;d call this a security flaw or bug... It seems like the design was wrong or it just wasn&#x27;t done right for some reason. A post-mortem on how this ended up in production would be interesting.
londons_exploreover 4 years ago
Getting in touch with &quot;the right people&quot; seems to be hard at a lot of companies for rare issues like this.<p>Imagine another rare issue - say I want to speak to the board of directors to give them a buyout offer... Would I manage that though in-app chat?
ruisealover 4 years ago
Why was it necessary for Troy to create an account on behalf of someone else?
评论 #24671029 未加载
评论 #24671284 未加载
3pt14159over 4 years ago
Didn&#x27;t ytcracker work for Grinder?<p>It&#x27;s a hard thing to Google, but I follow him on Twitter and I thought that was the case. If so, this is a hilarious event for some other rapper to dunk on.
megousover 4 years ago
One reason why generating random email address for each registered account is a good practice if you care about security, and can sometimes save you.
评论 #24668402 未加载
vmceptionover 4 years ago
fuck <i>&quot;responsible disclosure&quot;</i><p>the outcome of this runaround was that grindr stated they will create a bug bounty program<p>proving once again that the &quot;market based bug bounty program&quot; has better aligned incentives and results in solving the same thing, vulnerabilities that should have been fixed to begin with were fixed.
tikuover 4 years ago
Must be some framework that has this behaviour as default. Else it would be really really bad.
评论 #24670283 未加载
评论 #24671573 未加载
homeroover 4 years ago
A lot of these &quot;bugs&quot; are just backdoors that countries might force them to include. When caught they call it a bug.
tsimionescuover 4 years ago
Shouldn&#x27;t this incur a massive fine under the GDPR? Isn&#x27;t this gross negligence in data protection?
评论 #24671065 未加载
peter303over 4 years ago
Grinder was owned by a Chinese video game company from 2016 to 2020. Under pressure from from the US government it was sold to a southern california company.
Havocover 4 years ago
Troy is obviously a good guy but I think he may be stepping into murky waters here with the switch from logging pwns to actively investigating.<p>Think he&#x27;ll do a legit job either way but it seems like a gamble to me. Investigative stuff is well...more murky