It turns out that abandoned Redbox kiosks are a major security risk for Redbox
It’s only been three months since Redbox was installed, but the company’s standard red kiosks can be a security nightmare as they become the highest bidders.
reports at least one owner of a defunct DVD and Blu-ray dispenser found a way to find confidential customer information in an encrypted file on the machine, which contains more than just one person’s preferences Trolls franchise. The database also contains sensitive data such as personal e-mails and home addresses.
In Mastodon, programmer Foone Turing, a self-described collector of the paranormal, said he cracked the encrypted files on a Redbox machine and matched the information he found with a real person.
The file he found was from a Redbox machine that operated in Morganton, North Carolina. The information it extracts from the file shows the customer’s name, ZIP code and usage history. If you want to know, rent a copy of that The giver again Maze Runner. I’ll bet that person is thankful that you decided not to release a Disney copy The Lone Ranger reboot.
Turing said Lowpass he was even able to obtain part of the credit card information of some customers. Although the entire log was missing, he noticed that it still had “the first six and the last four [digits] for each credit card used, and low-level transaction information.”
And it didn’t take a lot of hacking knowledge to crack the machines. The code Redbox uses to program machines is “the kind of code you get when you hire 20 new students who know C# but none of them have. [sic] wrote any software before,” Turing wrote in Mastodon.
Now here’s the kicker. It’s clear that Redbox’s parent company, Chicken Soup for the Soul, didn’t do a great job of cleaning up the machines before selling them off like old shoes at a garage sale. There are over 24,000 kioks and some people even shop at the store and take things home. Suddenly, paying a few bucks for Netflix doesn’t sound so bad right now.
We’ve contacted Chicken Soup for Soul’s comment.
Source link