Hacker News

290

Someone at BrowserStack Is Leaking Users' Email Address

by m_km177539487877 comments
Everyone in this thread suggesting a “data leak” or “compromise” is totally missing the fact that this is how Apollo works. This is often times overlooked by Apollo customers themselves. You have to opt out of customer data sharing (and in doing so lose out on the value of the product): https://knowledge.apollo.io/hc/en-us/articles/20727684184589...

Not commenting on whether this is good or ethical (or even totally legal), but this is what is happening behind the scenes.

by streblo1775398445
>After a brief discussion, the emailer told me they got my details from Apollo.io

The landing page for Apollo.io says it's a "AI sales platform". In other words, a CRM. My guess is that someone on the sales team uploaded the entire customer list for sales purposes, not realizing the privacy implications.

by gruez1775398511
> BrowserStack routinely sell or give away their users' data.

> A third-party service used by BrowserStack siphons off information to send to others.

> An employee or contractor at BrowserStack is exfiltrating user data and transferring it elsewhere.

Or the simpler answer, their db/email list has been compromised.

by jofzar1775397080
> Like all good nerds, I generate a unique email address for every service I sign up to. This has several advantages - it allows me to see if a message is legitimately from a service, if a service is hacked the hackers can't go credential stuffing, and I instantly know who leaked my address.

I think a lot of services will "de-alias" the email addresses from these tricks to prevent alts, account spam, and to still target the "real" account holder email. So the old tricks like "<name>+<website>@<host.com>" is not considered a unique email from "<name>@<host.com>". Unless your site-specific emails are completely new inbox aliases, then I don't think this is as effective as people think it is anymore.

by petcat1775398641
Thank you for naming and shaming the company.
by sph1775403352
BrightData is another company offering hosted browsers who has also recently leaked private data, although they did email customers to warn them.

I wonder if both of these companies were compromised by a shared vulnerability in headless Chrome? Or else just a coincidence that 2 headless browser companies got hacked at the same time?

I run a headless browser fingerprinting project and have found that URLs that I only fetched via BrightData have subsequently had fetches by Anthropic's Claudebot.

I think most likely an attacker who has the customer data is using Claude to analyse it.

by jstanley1775397193
Having your own domain and giving a unique email address to everyone... Is it correct to call this canary trapping email addresses?

https://en.wikipedia.org/wiki/Canary_trap

by theandrewbailey1775404263
Selected quotes from Apollo's GDPR page:

> Consent must be "freely given, specific, informed, and unambiguous."

and

> Apollo notifies them when their data is added to Apollo's database of business contact information and provides them with instructions on how to opt out.

https://knowledge.apollo.io/hc/en-us/articles/4409141087757-...

Now, their claim appears to be that they're processing business contact data under the legal basis of "Legitimate Interests". But as much as I am a big fan of not doing things that require a legal basis of "Consent", I'm unconvinced that they ensure their customers are sticking as tightly to their basis as they ought to be if they wish to claim it.

In other words: yes, if you have a CRM in then you might derive legitimate interests in sharing with Apollo. But you need to make sure you actually have the right legal basis for putting customer details into your CRM, and your support database almost certainly does not hold appropriate data!

So ultimately I think this is on both Browserstack (for connecting and sharing data other than in accordance with a legal basis) and Apollo (for making it too easy for their customers to send them data without a sound legal basis and then for sharing that data without suitably validating they had the legal basis to).

Apollo's privacy centre makes all the right claims about how they comply with GDPR, but the OP's story demonstrates that they're not as scrupulous in their verification as they claim to be. And strictly, both should be reporting the breach and taking steps to ensure it doesn't recur.

by andrewaylett1775401747
Guys at seamless io do the same thing. I found a very personal email address on the system. I figured someone at work was leaking their address book to seamless.

I don’t know how to stop it

by nashashmi1775401617
Is the _very big_ company Amazon, I wonder.
by Macha1775397244
This is beyond outrageous. And the data leak angle they’re pushing doesn’t make sense either.
by khalic1775397945
Meta comment on the blog itself: Those theme options are really neat. Such a great touch for a personal blog!
by freedomben1775402069
Or the company data has been compromised. That’s a really common way for emails to ‘leak’.
by wood_spirit1775396811
Thanks to iCloud I haven't used my actual email addresses anywhere in a decade (even without Hide My Email their aliases were very handy)

Caught quite a few leakers that way, by using specific addresses for specific sites or categories of sites

(Last time I tried, Gmail's aliases were useless; they included your real address in the alias!)

by Razengan1775399135
Thanks to iCloud I haven't used my actual email addresses anywhere in a decade (even without Hide My Email their aliases were very handy)
by Razengan1775399078
Email needs a consent revocation system effectively like how Blackberry had PINs for BBM
by villgax1775398874
[dead]
by meidad_g1775406237
[dead]
by devcraft_ai1775401240
[dead]
by jeremie_strand1775401286
[flagged]
by Robdel121775398957
Just wait till OP learns about Accurint!
by ohhman111775399109
Browserstack is Indian I believe. They will do anything for money, so ofcourse they will sell it to email spam lists.
by sammy22551775403592