{"id":63900,"date":"2025-01-12T13:32:51","date_gmt":"2025-01-12T13:32:51","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/"},"modified":"2025-01-12T13:33:53","modified_gmt":"2025-01-12T13:33:53","slug":"mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/","title":{"rendered":"Mobile apps exploited to harvest location data on massive scale, hacked files reveal"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<p id=\"why-it-matters\"><strong>A sizzling potato:<\/strong> 1000&#8217;s of standard cellular apps throughout Android and iOS are allegedly being exploited to reap delicate location knowledge on an unprecedented scale. This knowledge assortment, occurring by the promoting ecosystem, is probably going taking place with out the data of customers and even app builders themselves. <\/p>\n<p>The knowledge comes from hacked recordsdata belonging to Gravy Analytics, a location knowledge firm whose subsidiary, Venntel, has beforehand bought international location knowledge to US legislation enforcement businesses. This info was reported by <a href=\"https:\/\/www.wired.com\/story\/gravy-location-data-app-leak-rtb\/\">Wired<\/a>, which collaborated with 404 Media to provide the story.<\/p>\n<p>The info breach has uncovered a sprawling community of apps, starting from standard video games like Sweet Crush to relationship apps resembling Tinder and Grindr. It additionally contains delicate classes resembling being pregnant monitoring and spiritual prayer apps.<\/p>\n<p>&#8220;For the primary time publicly, we appear to have proof that one of many largest knowledge brokers promoting to each industrial and authorities purchasers seems to be buying their knowledge from the internet marketing &#8216;bid stream,&#8217; slightly than code embedded into the apps themselves,&#8221; Zach Edwards, senior risk analyst at cybersecurity agency Silent Push, informed <a href=\"https:\/\/www.404media.co\/candy-crush-tinder-myfitnesspal-see-the-thousands-of-apps-hijacked-to-spy-on-your-location\/\">404 Media<\/a>.<\/p>\n<p>This revelation sheds mild on the world of real-time bidding (RTB), a course of the place firms bid to position adverts inside apps. Nonetheless, this technique has a harmful aspect impact: knowledge brokers can intercept this course of and harvest the situation knowledge of cell phone customers.<\/p>\n<p>Edwards described this as &#8220;a nightmare situation for privateness,&#8221; including that &#8220;there&#8217;s some firm on the market appearing like a world honey badger, doing no matter it pleases with each piece of knowledge that comes its means.&#8221;<\/p>\n<p><picture style=\"padding-bottom: calc(100% * 1600 \/ 3626)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/01\/2025-01-11-image-17-j_500.webp 500w, https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/01\/2025-01-11-image-17-j_1100.webp 1100w, https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/01\/2025-01-11-image-17-j.webp 3626w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1600\" width=\"3626\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/01\/2025-01-11-image-17.jpg\" srcset=\"https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/01\/2025-01-11-image-17-j_500.webp 500w, https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/01\/2025-01-11-image-17-j_1100.webp 1100w, https:\/\/www.techspot.com\/images2\/news\/bigimage\/2025\/01\/2025-01-11-image-17-j.webp 3626w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/p>\n<p class=\"tsadinc\">The dimensions of this knowledge assortment is staggering. The hacked Gravy knowledge contains tens of hundreds of thousands of cell phone coordinates from units in america, Russia, and Europe. The checklist of affected apps is intensive, masking a variety of classes together with social networks, health trackers, e-mail purchasers, and even VPN apps that customers could have downloaded in an try to guard their privateness.<\/p>\n<p class=\"tsadinc\">Though the information breach seems to contain Gravy Analytics, it stays unclear whether or not Gravy collected this location knowledge itself or obtained it from one other supply. The dataset, which dates to 2024, affords a uncommon glimpse into the opaque world of the situation knowledge business.<\/p>\n<p class=\"tsadinc\">Gravy Analytics performs a pivotal position on this ecosystem, aggregating cell phone location knowledge from numerous sources and promoting it to industrial entities or authorities businesses through its subsidiary, Venntel. Earlier investigations revealed that Venntel&#8217;s purchasers embody a number of U.S. authorities businesses, resembling Immigration and Customs Enforcement (ICE), Customs and Border Safety (CBP), the IRS, the FBI, and the DEA.<\/p>\n<p class=\"tsadinc\">The implications of this knowledge assortment are far-reaching, elevating critical privateness considerations and highlighting the potential for this knowledge for use in ways in which customers by no means meant or consented to. For example, 404 Media and different retailers beforehand demonstrated how a instrument known as Find X, powered by Venntel&#8217;s knowledge, could possibly be used to observe guests to out-of-state abortion clinics.<\/p>\n<p class=\"tsadinc\">Most app builders and firms included within the checklist didn&#8217;t reply to requests for remark. Nonetheless, Flightradar24 said in an e-mail that it had by no means heard of Gravy however acknowledged displaying adverts to &#8220;assist maintain Flightradar24 free.&#8221;<\/p>\n<p class=\"tsadinc\">Tinder denied any relationship with Gravy Analytics, whereas Muslim Professional, one of many affected prayer apps, claimed it doesn&#8217;t authorize advert networks to gather location knowledge of its customers.<\/p>\n<p class=\"tsadinc\">The invention that this knowledge seems to originate from real-time bidding is especially important. It shifts accountability towards rogue actors within the promoting business and the tech giants that facilitate it. It additionally means that many main app publishers could also be unaware their customers&#8217; knowledge is being harvested, making it troublesome for them to take preventive measures.<\/p>\n<p class=\"tsadinc\">Krzysztof Franaszek, founding father of digital forensics agency Adalytics, reviewed the leaked knowledge and noticed that &#8220;no less than a few of this knowledge would seemingly have been sourced from advertising-related real-time bidding.&#8221; He famous proof that Google&#8217;s promoting platform is serving among the adverts that allow this monitoring by exterior firms, together with potential authorities contractors.<\/p>\n<p class=\"tsadinc\">The FTC has lately taken motion in opposition to related practices. In December, the company banned location knowledge firm Mobilewalla from amassing shopper knowledge &#8220;from internet marketing auctions for functions aside from collaborating in these auctions.&#8221; The FTC additionally ordered Venntel and Gravy Analytics to delete historic location knowledge and barred them from promoting knowledge associated to delicate areas, resembling well being clinics and locations of worship, besides underneath restricted circumstances.<\/p>\n<\/p><\/div>\n<iframe src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.techspot.com\/news\/106307-mobile-apps-exploited-harvest-location-data-massive-scale.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A sizzling potato: 1000&#8217;s of standard cellular apps throughout Android and iOS are allegedly being exploited to reap delicate location knowledge on an unprecedented scale&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":63901,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-63900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile apps exploited to harvest location data on massive scale, hacked files reveal - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile apps exploited to harvest location data on massive scale, hacked files reveal - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-12T13:32:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-12T13:33:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/01\/2025-01-11-image-16-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Mobile apps exploited to harvest location data on massive scale, hacked files reveal\",\"datePublished\":\"2025-01-12T13:32:51+00:00\",\"dateModified\":\"2025-01-12T13:33:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/\"},\"wordCount\":782,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/2025-01-11-image-16-scaled.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/\",\"name\":\"Mobile apps exploited to harvest location data on massive scale, hacked files reveal - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/2025-01-11-image-16-scaled.jpg\",\"datePublished\":\"2025-01-12T13:32:51+00:00\",\"dateModified\":\"2025-01-12T13:33:53+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/2025-01-11-image-16-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/2025-01-11-image-16-scaled.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/01\\\/12\\\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile apps exploited to harvest location data on massive scale, hacked files reveal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile apps exploited to harvest location data on massive scale, hacked files reveal - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/","og_locale":"en_US","og_type":"article","og_title":"Mobile apps exploited to harvest location data on massive scale, hacked files reveal - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2025-01-12T13:32:51+00:00","article_modified_time":"2025-01-12T13:33:53+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/01\/2025-01-11-image-16-scaled.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Mobile apps exploited to harvest location data on massive scale, hacked files reveal","datePublished":"2025-01-12T13:32:51+00:00","dateModified":"2025-01-12T13:33:53+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/"},"wordCount":782,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/01\/2025-01-11-image-16-scaled.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/","url":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/","name":"Mobile apps exploited to harvest location data on massive scale, hacked files reveal - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/01\/2025-01-11-image-16-scaled.jpg","datePublished":"2025-01-12T13:32:51+00:00","dateModified":"2025-01-12T13:33:53+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/01\/2025-01-11-image-16-scaled.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/01\/2025-01-11-image-16-scaled.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/01\/12\/mobile-apps-exploited-to-harvest-location-data-on-massive-scale-hacked-files-reveal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Mobile apps exploited to harvest location data on massive scale, hacked files reveal"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/63900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=63900"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/63900\/revisions"}],"predecessor-version":[{"id":63902,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/63900\/revisions\/63902"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/63901"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=63900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=63900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=63900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}