Cricket community network “criticalsocial.com” leaks 100k user entries and administrative credentials. The open database contains emails, phone numbers, names, hashed user passwords, dates of birth, and addresses of the website users.
Cricketsocial.com is owned by an LLC situated in the United States. Apart from the Cricket League of New Jersey, the majority of the organizations mentioned are located in India. The exposed database was hosted in AWS.
The open instance stores not only the admin credentials and users’ personal information, but also all of the website’s content. Content such as posts, comments, like counts, and image links are all saved in a single AWS storage bucket.
Despite the fact that some information from the bigger database was most likely used for testing purposes, security risks remain. The information in the disclosed database was kept in plaintext format, and the security implications are high, as this data can be sold or used for identity theft or spam.