Exposed Admin Credentials at AU10TIX: A Hacker’s Playground for a Year
AU10TIX, an ID verification company for TikTok, X, and Uber, exposed admin credentials for over a year, risking user identities. Mossab Hussein from spiderSilk first spotted the breach. Hackers could access names, birthdates, and ID images, fueling identity theft. AU10TIX claims no evidence of exploitation but is upgrading security.

Hot Take:
Looks like AU10TIX just learned that even a company specializing in ID verification can’t skip the “verify your own security” step. Hackers must feel like they hit the jackpot with this one – it’s like finding the keys to the kingdom under the welcome mat!
Key Points:
- AU10TIX left administrative credentials exposed for over a year.
- The exposure was discovered by spiderSilk’s chief security officer, Mossab Hussein.
- Credentials led to a logging platform with links to identity documents.
- Potential hacker activity noted, credentials appeared on Telegram.
- AU10TIX claims no evidence of data exploitation but is upgrading their system.
Already a member? Log in here