Amazon accidentally exposes internal servers containing users’ Prime Video viewing habits


A database containing Amazon Prime Video users’ viewing habits, stored on an internal Amazon server, was accidentally exposed online that anyone with a web browser could access.

Cyber-security researcher Anurag Sen found a database containing Amazon Prime viewing habits stored on an internal Amazon server that was accessible online.

TechCrunch reported that the database was first detected by Internet exposure on September 30, according to search engine Shodan.

“But since the database was not password protected, the data within it could be accessed by anyone with a web browser knowing its IP address,” the report said.

The database contained approximately 215 million entries of viewing data, such as the name of the show or movie that is being streamed, what device it was streamed on, and other internal data.

The Amazon Prime Video database was later removed from the Internet.

An Amazon spokesperson told TechCrunch that there was a “deployment error with the Prime Video analytics server.”

“This issue has been resolved and no account information (including login or payment details) was exposed. This was not an AWS issue; AWS is secure by default and performed as designed,” the spokesperson said. Told.

In its latest Q3 earnings call, the company said that “The Lord of the Rings: The Rings of Power” attracted over 25 million global viewers on its first day, the biggest debut in Prime Video history, and closed at 100 million. Happened. audience till date

It marked the start of Prime Video’s inaugural season as the exclusive home of NFL Thursday Night Football, with more than 15 million viewers for its first game.


A post by Amazon that accidentally exposed an internal server containing users’ Prime Video viewing habits first appeared on BGR India.

Read full article here

Leave a Reply