Leaky API exposes Black Hat attendees’ personal data
Embarrassing breach revealed names, email addresses, phone numbers and more


One of the world's biggest cyber security conferences was put in an awkward position after a poorly-secured API enabled a security researcher to download the personal details and contact information of every attendee.
The annual Black Hat conference in Las Vegas is among the most anticipated events in the infosec calendar, with hackers, security researchers and law enforcement officials alike descending on Nevada for a week of demonstrations, hands-on sessions and general security knowledge-sharing.
The nature of the conference, as well as the adversarial relationship between some of the groups in attendance, means that OpSec (or operational security) is a priority for guests at the show. This is precisely why security researcher NinjaStyle was surprised to discover that a flaw had left Black Hat attendee data exposed.
Like many conferences, the badges issued to Black Hat attendees include an NFC tag, which exhibitors at the show can scan to collect details used for marketing purposes. After investigating this tag, NinjaStyle discovered that it included a link to download business card reader app BCard.
NinjaStyle downloaded and decompiled the app, and found an API endpoint, which the app used to fetch data from the server. After identifying which portions of the code identified the event ID and the badge ID, he used this data to try and download his information from the BCard server.
"To my surprise, I was able to pull my attendee data completely unauthenticated over this API," he explained in a blog post. "Next, I did some math to determine the feasibility of brute forcing all BlackHat attendees."
"The rate at which we were able to brute force the API would mean that we could successfully collect all BlackHat 2018 registered attendees' names, email addresses, company names, phone numbers, and addresses in only approximately 6 hours."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The issue, which BCard blamed on a "legacy system", has now been fixed, and NinjaStyle noted the quick work of the BCard team, stating that it was resolved "within 24 hours of initial contact".
It should be noted that the breach was not directly due to a lapse in security on the part of Black Hat's organisers and there is currently no indication that this flaw has been maliciously exploited.
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
The Race Is On for Higher Ed to Adapt: Equity in Hyflex Learning
By ITPro
-
Google faces 'first of its kind' class action for search ads overcharging in UK
News Google faces a "first of its kind" £5 billion lawsuit in the UK over accusations it has a monopoly in digital advertising that allows it to overcharge customers.
By Nicole Kobie
-
Should your business start a bug bounty program?
In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
By Kate O'Flaherty
-
PyPI attack: Targeting of repository 'shows no sign of stopping'
News Greater collaboration and understanding of attackers’ tactics is key to mitigating open source security threats
By Ross Kelly
-
Capita's handling of cyber attack shows companies still fail at breach reporting
Analysis Capita initially told customers there was “no evidence” of data having been compromised in the March cyber attack
By Ross Kelly
-
Malware being pushed to businesses by search engines remains a pervasive threat
News High-profile malvertising campaigns in recent months have surged
By Ross Kelly
-
There's only one way to avoid credential stuffing attacks
Opinion PayPal accounts were breached last year due to a credential stuffing attack, but can PayPal avoid taking responsibility?
By Davey Winder
-
Five things to consider before choosing an MFA solution
In-depth Because we all should move on from using “password” as a password
By Rene Millman
-
OpenAI to pay up to $20k in rewards through new bug bounty program
News The move follows a period of unrest over data security concerns
By Ross Kelly
-
Cyber security suffers from a communication problem
News Negative language around ‘human failures’ is eroding trust between security teams and broader business functions - it has to stop
By Ross Kelly