Photograph Depicting Pinkfong Company's Apps
© PREMIO STOCK/Shutterstock.com

VPNOverview’s research team recently discovered a cybersecurity flaw that leaked sensitive data from Pinkfong Company apps, including Google login credentials, app settings, and a Slack webhook.

We alerted Pinkfong staff, who immediately sealed the leak. No personally identifiable information from customers was ever exposed in this breach.

Pinkfong, a South Korean company, publishes educational apps for kids, with downloads in the millions. They are also the company responsible for the “Baby Shark Dance” — now YouTube’s most-watched video with over 11 billion views. In addition to educational tools, they also create and publish apps featuring popular characters like Peppa Pig and Bob the Builder.

Infographic describing how the Pinkfong breach happened, and what the details of the leak are

CMS Bucket Left Open

Our security team discovered an unsecured AWS S3 bucket containing data and scripts belonging to Pinkfong. While examining the bucket, we found what appeared to be data from Pinkfong’s CMS (content management system) used for configuring their apps and hosting streaming content.

Each directory in the bucket held settings, content, and scripts related to their apps.

Folder showing multiple folders obtained in the Pinkfong leak

Many of the scripts we found had plaintext credentials, which exposed some of the Baby Shark developer’s web services.

Google Drive, Gmail, and Slack Credentials Leaked

Some more concerning discoveries include exposed credentials and passwords for Gmail, Google Drive, and Slack. Two separate email accounts had their passwords leaked. 

Blurred data file with Google account credentials obtained in the Pinkfong leak

It appeared Pinkfong uses Google Sheets as part of its CMS pipeline and leaked valid OAuth2 keys that enabled access to their Sheets.

Blurred data file with Google Drive credentials obtained in the Pinkfong leak

“I was surprised to see so many credentials in plaintext,” Aaron Phillips, the cybersecurity professional leading this investigation, said. “Everyone is talking about DevSecOps lately, and I think this breach is a really good illustration of why they’re necessary. You just can’t leave passwords laying around in scripts anymore or store OAuth keys in an unencrypted bucket. Whether it’s a CI/CD pipeline or CMS, that’s asking for trouble.”

Blurred file with Google Drive OAuth keys obtained in the Pinkfon leak

When we accessed Pinkfong’s Google Sheets, we also discovered settings for their apps. However, we did not encounter any user information stored there.

Another discovery of note was a Slack webhook and username found in a script.

Blurred data file with Slack settings obtained in the Pinkfong leak

Timeline

Here is a timeline of events:

Event Date Time
Our team discovered sensitive files in an open S3 bucket. August 10, 2022 3:30 PM
We were able to confirm the files belonged to Pinkfong. August 11, 2022 1:15 PM
We notified Pinkfong of the breach via email. August 12, 2022 4:52 PM
We sent a second notification to Pinkfong’s email. August 22, 2022 10:50 AM
Customer Support replied and gave us a link to a web form,
which we used to notify Pinkfong again.
August 25, 2022 9:53 AM
Pinkfong secured their bucket and closed the breach. August 25, 2022 10:00 AM

When asked about the plaintext passwords we found, Pinkfong co-founder and CTO Dongwoo Son said, “These days we don’t put passwords in the script, but there were problems in legacy scripts, so we deleted the files that contain plain passwords.”

The Risk of a Google Drive Breach

Google Drive, like any cloud storage service, can be at risk of leaks if the software is vulnerable or misconfigured. For instance, in 2018, an official software update created a Google Drive security hole via the Google+ API, which exposed the private data of over half a million users.

Being able to access OAuth keys is also dangerous, even if the permissions are segmented out well. We just covered a Microsoft incident relating to the risks of OAuth apps.

In other cases, we’ve seen Google Drive breaches lead to mass-scale identity theft and phishing attacks. But in this instance, that turned out not to be an issue.

DevSecOps and the Hybrid Cloud

Pinkfong’s exposed CMS storage shows why DevSecOps (development, security, and operations) is important when a developer uses a hybrid cloud infrastructure. Every small security flaw is magnified when code is accidentally published on the internet. Best practices, like keeping passwords out of maintenance scripts and encrypting OAuth keys, become critical.

Just days before this report, on Sept. 28, 2022, we covered the Fast Company hack where attackers had commandeered parts of the firm’s CMS to send obscene push notifications to subscribers. Attackers in that case also noted they had access to a Slack webhook, which they said they opted not to use.

While hijacked webhooks pose a phishing risk, specifically, developers at Baby Shark or other apps could have been targeted with social engineering schemes designed to collect additional credentials or data.

Ultimately, no harm was done to Pinkfong’s millions of users. But the company and others like it — with popular apps and an enormous YouTube audience — are a compelling target for cybercriminals. We’re satisfied that Pinkfong was able to close this breach and secure its CMS and cloud services.

Leave a comment