Description

A threat actor known as 'emo' has leaked personal information of 442,519 Life360 customers, exploiting a flaw in the login API. Emo revealed that the unsecured API endpoint allowed easy verification of users' email addresses, names, and phone numbers. Specifically, the Android login endpoint returned the first name and phone number in the API response, not visible to the user. Verified phone numbers appeared partially masked. Life360 has since patched the flaw, returning placeholder phone numbers for additional requests. The data breach, first reported by HackManac, occurred in March 2024, with emo denying involvement. On July 15, 2024, emo also leaked over 15 million Trello email addresses, collected through an unsecured API in January. Life360 disclosed an extortion attempt following a breach of the Tile customer support platform, where attackers accessed sensitive information, including names, addresses, email addresses, phone numbers, and device IDs. The threat actor used stolen credentials from a former Tile employee to breach multiple systems, enabling unauthorized actions such as finding users, creating admin accounts, and transferring device ownership. The attacker also scraped customer data, evading detection while sending millions of requests. Life360 CEO Chris Hulls clarified that the exposed data did not include credit card numbers, passwords, login credentials, location data, or government-issued IDs. The company has not disclosed when the breach was detected or the number of impacted customers. Life360, serving over 66 million members globally, acquired Tile for $205 million in December 2021.