Fiverr Faces Scrutiny Over Exposed User Files Online

Fiverr is facing backlash after exposing thousands of sensitive user files online due to improper storage. This includes tax forms and IDs, raising identity theft concerns. Users are advised to monitor their accounts and change passwords.

BreachesHIGHUpdated: Published:
Featured image for Fiverr Faces Scrutiny Over Exposed User Files Online

Original Reporting

SCSC Media

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, Fiverr accidentally made thousands of user files public online, risking people's personal information.

What Happened

Fiverr, the popular gig-work platform, is facing scrutiny after a security researcher uncovered that thousands of user files were accessible online. This exposure is attributed to improper storage practices involving a third-party service, Cloudinary, which Fiverr used for storing images and PDFs.

Who's Affected

The exposed data includes sensitive documents such as tax forms, driver's licenses, work contracts, and even API keys. This incident potentially affects all users who uploaded these documents to the platform, raising concerns about identity theft and data privacy.

What Data Was Exposed

The files made publicly accessible included: This data was indexed by search engines like Google, making it easy for anyone to find.

📁

Official identification documents

👤

Private work deliverables

💰

Passwords

🏥

Tax records

What You Should Do

Cybersecurity experts recommend that users who shared sensitive documents on Fiverr take immediate action: Fiverr has denied that a security breach occurred, stating that users consented to share these files for marketplace activities. However, experts argue that consent for sharing does not imply consent for public exposure. This incident highlights the importance of secure data handling practices, especially when using third-party services for storage. Users should always ensure that their sensitive information is protected and not publicly accessible.

Containment

  • 1.Monitor for identity theft: Keep an eye on your accounts for any suspicious activity.

🔒 Pro Insight

🔒 Pro insight: This incident underscores the critical need for secure data storage practices, especially when utilizing third-party services for sensitive user information.

SCSC Media
Read Original

Related Pings