A massive 2.7 billion records containing sensitive user data, including Wi-Fi network names, passwords, IP addresses, and device identifiers, were exposed in a massive IoT security breach linked to Mars Hydro, a China-based grow light manufacturer, and LG-LED SOLUTIONS LIMITED, a California-registered firm.
The unprotected database, discovered by cybersecurity researcher Jeremiah Fowler and reported to vpnMentor, underscores critical vulnerabilities in IoT device security and cloud storage practices.
The exposed database, totaling 1.17 terabytes, was publicly accessible without password protection or encryption. It contained logs, monitoring records, and error reports from IoT devices sold globally, including:
Mars Hydro’s Mars Pro app, used to control IoT grow lights and climate systems, reportedly collected this data despite its privacy policy claiming no user data collection.
Further investigation linked the records to LG-LED SOLUTIONS LIMITED, a California-registered company. The exposed data also included API details and URL links to LG-LED SOLUTIONS, Mars Hydro, and Spider Farmer companies that manufacture and sell agricultural grow lights, fans, and cooling systems.
Many records were labeled “Mars-pro-iot-error” or “SF-iot-error,” containing tokens, app versions, device types, and IP addresses alongside SSID credentials.
Fowler promptly notified LG-LED SOLUTIONS and Mars Hydro, and within hours, access to the database was restricted. Mars Hydro confirmed that the “Mars Pro” app, available on both iOS and Android in multiple languages, is their official product.
However, it remains unclear whether LG-LED SOLUTIONS directly managed the database or used a third-party contractor. The duration of the database’s exposure and whether unauthorized parties accessed it are also unknown.
The leaked data poses severe risks:
Fowler highlighted the “nearest neighbor attack,” a tactic used by Russian GRU hackers in 2024 to breach a Ukraine-focused organization via nearby Wi-Fi networks, as a plausible risk scenario.
Palo Alto Networks’ threat report adds context: 98% of IoT device data is unencrypted, and 57% of devices are highly vulnerable.
This incident reflects systemic IoT security flaws:
Notably, researchers speculate this breach might involve the same database exposed in 2019 by Orvibo, a Chinese smart-device brand.
Experts urge IoT manufacturers and users to:
Mars Hydro and LG-LED SOLUTIONS have not commented on the breach’s origin or potential third-party involvement. Fowler emphasized his findings aim to “raise awareness,” with no evidence of direct misuse.
PCI DSS 4.0 & Supply Chain Attack Prevention – Free Webinar
Hybrid work has become a permanent fixture in the modern enterprise, blending remote and in-office…
The Co-operative Group, one of the UK’s largest retailers, has been forced to shut down…
Ascension Healthcare, one of the largest private healthcare systems in the United States, has disclosed…
A significant security vulnerability has been identified in the SonicWall Connect Tunnel Windows Client, affecting…
OpenAI has reversed last week's update to its GPT-4o model after users reported the AI…
A sophisticated multi-stage malware campaign linked to the North Korean Konni APT group has been…