We alerted Pinkfong staff, who immediately sealed the leak. No personally identifiable information from customers was ever exposed in this breach. Pinkfong, a South Korean company, publishes educational apps for kids, with downloads in the millions. They are also the company responsible for the “Baby Shark Dance” — now YouTube’s most-watched video with over 11 billion views. In addition to educational tools, they also create and publish apps featuring popular characters like Peppa Pig and Bob the Builder.

CMS Bucket Left Open

Our security team discovered an unsecured AWS S3 bucket containing data and scripts belonging to Pinkfong. While examining the bucket, we found what appeared to be data from Pinkfong’s CMS (content management system) used for configuring their apps and hosting streaming content. Each directory in the bucket held settings, content, and scripts related to their apps.

Many of the scripts we found had plaintext credentials, which exposed some of the Baby Shark developer’s web services.

Google Drive, Gmail, and Slack Credentials Leaked

Some more concerning discoveries include exposed credentials and passwords for Gmail, Google Drive, and Slack. Two separate email accounts had their passwords leaked. 

It appeared Pinkfong uses Google Sheets as part of its CMS pipeline and leaked valid OAuth2 keys that enabled access to their Sheets.

“I was surprised to see so many credentials in plaintext,” Aaron Phillips, the cybersecurity professional leading this investigation, said. “Everyone is talking about DevSecOps lately, and I think this breach is a really good illustration of why they’re necessary. You just can’t leave passwords laying around in scripts anymore or store OAuth keys in an unencrypted bucket. Whether it’s a CI/CD pipeline or CMS, that’s asking for trouble.”

When we accessed Pinkfong’s Google Sheets, we also discovered settings for their apps. However, we did not encounter any user information stored there. Another discovery of note was a Slack webhook and username found in a script.

Timeline

Here is a timeline of events: When asked about the plaintext passwords we found, Pinkfong co-founder and CTO Dongwoo Son said, “These days we don’t put passwords in the script, but there were problems in legacy scripts, so we deleted the files that contain plain passwords.”

The Risk of a Google Drive Breach

Google Drive, like any cloud storage service, can be at risk of leaks if the software is vulnerable or misconfigured. For instance, in 2018, an official software update created a Google Drive security hole via the Google+ API, which exposed the private data of over half a million users. Being able to access OAuth keys is also dangerous, even if the permissions are segmented out well. We just covered a Microsoft incident relating to the risks of OAuth apps. In other cases, we’ve seen Google Drive breaches lead to mass-scale identity theft and phishing attacks. But in this instance, that turned out not to be an issue.

DevSecOps and the Hybrid Cloud

Pinkfong’s exposed CMS storage shows why DevSecOps (development, security, and operations) is important when a developer uses a hybrid cloud infrastructure. Every small security flaw is magnified when code is accidentally published on the internet. Best practices, like keeping passwords out of maintenance scripts and encrypting OAuth keys, become critical. Just days before this report, on Sept. 28, 2022, we covered the Fast Company hack where attackers had commandeered parts of the firm’s CMS to send obscene push notifications to subscribers. Attackers in that case also noted they had access to a Slack webhook, which they said they opted not to use. While hijacked webhooks pose a phishing risk, specifically, developers at Baby Shark or other apps could have been targeted with social engineering schemes designed to collect additional credentials or data. Ultimately, no harm was done to Pinkfong’s millions of users. But the company and others like it — with popular apps and an enormous YouTube audience — are a compelling target for cybercriminals. We’re satisfied that Pinkfong was able to close this breach and secure its CMS and cloud services.

Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 55Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 34Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 66Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 47Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 91Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 19Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 39Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 8Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 44Baby Shark App Developer Leaks Credentials and Keys In Cloud Breach - 99