Massive data leak exposes passwords of 1.8 million users through misconfigured Firebase servers

A major security lapse has exposed the plaintext passwords and sensitive user data of 1.8 million individuals due to misconfigured Firebase instances. Discovered by cybersecurity researchers at Website Planet, the exposed data included usernames, email addresses, phone numbers, billing details and unencrypted passwords. The information was stored on open Firebase real-time databases used by over 900 mobile applications, mostly Android-based, many of which had millions of downloads. These apps spanned categories from fitness to financial services. The researchers notified Google and relevant developers, but many instances remained unsecured at the time of the report. Firebase, owned by Google, is widely used for backend app development, and its default configuration settings have previously been linked to similar incidents.

Analysis by Our Experts:

Storing plaintext passwords on open cloud databases in 2025 is not just outdated. It is reckless. This exposure did not result from a zero-day exploit or a sophisticated intrusion. It happened because basic security practices were skipped across hundreds of apps, some with millions of users. The responsibility lies both with negligent developers and with Google’s Firebase platform, which continues to allow insecure deployments by default. If cloud tools remain this frictionless for attackers, the industry needs to stop calling it innovation and start calling it liability engineering.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

ZENDATA Cybersecurity

SVG: The Trojan Horse hiding in your inbox

ZENDATA cybersecurity

AI-generated TikTok videos used to spread info-stealing malware

Cyber ​​yellow bee robot

Bumblebee malware distributed via Zenmap WinMTR SEO poisoning