Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

US freight technology company puts its shipping system and customer data on the web

YouTube now offers a way for parents to block their kids from watching short videos

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » US freight technology company puts its shipping system and customer data on the web
Startups

US freight technology company puts its shipping system and customer data on the web

userBy userJanuary 14, 2026No Comments7 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Over the past year, security researchers have been urging the global shipping industry to strengthen its cyber defenses after a spate of cargo thefts by hackers. Researchers say they witnessed an elaborate hack that targeted a logistics company to hijack a large number of customers’ products and redirect them into the hands of criminals, marking an alarming collusion between hackers and real-life organized crime groups.

There’s a stolen e-cig delivery truck here, and there’s a suspected lobster robbery.

One of the lesser-known but important US maritime technology companies has spent the past few months patching its systems after a number of simple vulnerabilities were discovered. The vulnerability inadvertently left the door to its shipping platform wide open to anyone on the internet.

The company is New York-based Bluspark Global, whose shipping and supply chain platform Bluvoyix enables hundreds of large companies to transport products and track shipments as they move around the world. Bluspark may not be a household name, but the company powers a large portion of freight transportation around the world, including retail giants, grocery stores, furniture manufacturers, and more. The company’s software is also used by several other companies that partner with Bluspark.

Bluspark told TechCrunch this week that the security issue has now been resolved. The company fixed five flaws in its platform, including the use of cleartext passwords by employees and customers and the ability to remotely access and manipulate Bluvoyix’s shipping software. The flaw exposed access to all customer data, including shipping records dating back decades.

But for Eaton Zveare, the security researcher who discovered the vulnerability in Bluspark’s systems in October, alerting the company to the security flaw took longer than discovering the bug itself because Bluspark had no identifying means to contact him.

In a now-published blog post, Zveare said he submitted details of five flaws in Bluspark’s platform to the Maritime Hacking Village. Maritime Hacking Village is a nonprofit organization that works to secure maritime space and helps researchers notify companies in the maritime industry of active security flaws, as in this case.

Weeks later, and after multiple emails, voicemails, and LinkedIn messages, the company had not responded to Zveare. In the meantime, anyone on the Internet could exploit this flaw.

As a last resort, Zveare contacted TechCrunch and tried to get them to flag the issue.

TechCrunch sent an email to Bluspark CEO Ken O’Brien and senior executives at the company alerting them to the security flaw, but did not receive a response. TechCrunch subsequently sent an email to customers of Bluspark, a publicly traded US retailer, warning them of the upstream security issue, but also received no response.

When TechCrunch sent a third email to Bluspark’s CEO, it included a partial copy of his password to demonstrate the severity of the security flaw.

A few hours later, TechCrunch received a response from the law firm representing Bluspark.

Plaintext passwords and unauthenticated APIs

Zveare explained in a blog post that he discovered the vulnerability after first visiting a Bluspark customer’s website.

Zubair wrote that the client’s website had a contact form that potential customers could use to inquire. By viewing the web page’s source code in the browser’s built-in tools, Zveare realized that the form sent the customer’s message through Bluspark’s servers via an API. (APIs allow two or more connected systems to communicate with each other over the Internet; in this case, your website’s contact form and your Bluspark customer’s inbox.)

Because the email sending code was embedded in the web page itself, anyone could modify the code and exploit this form to send malicious emails, including phishing scams originating from real Bluspark customers.

Zveare pasted the API’s web address into his browser, which loaded a page containing automatically generated documentation for the API. This web page was a master list of all the actions that could be performed with the company’s API, such as requesting a list of users with access to Bluspark’s platform and creating new user accounts.

The API documentation page also included a feature that allowed anyone to “test” the API by submitting commands to retrieve data from Bluspark’s servers as a logged-in user.

Zveare discovered that the API does not require passwords or credentials to return sensitive information from Bluspark’s servers, despite the page claiming that authentication is required to use it.

Using only a list of API commands, Zveare was able to retrieve a large number of user account records for employees and customers using Bluspark’s platform in a completely unauthenticated manner. This included usernames and passwords displayed unencrypted and in clear text, including accounts associated with the platform’s administrators.

Once an attacker has obtained the administrator’s username and password, they could log into this account and run rampant. Zveare, a bona fide security researcher, could not use the credentials because it is illegal to use someone else’s password without permission.

The API documentation included a command that would allow anyone to create a new user with administrator access, so Zveare did just that and gained unrestricted access to the Bluvoyix supply chain platform. Zveare said the administrator access level allowed him to view customer data dating back to 2007.

Zveare discovered that when he logged in with this newly created user, each API request was wrapped with a user-specific token. This was to ensure that each time a user clicked a link they were actually granted access to the portal page. However, since no token was required to complete the command, Zveare was able to send the request without using a token at all, further confirming that the API was not authenticated.

Bugs fixed and company planning new security policies

After establishing contact with Bluspark’s law firm, Zveare gave TechCrunch permission to share a copy of his vulnerability report with its representatives.

Days later, the law firm announced that Bluspark was working to repair most of the deficiencies and hire a third-party firm for an independent evaluation.

Zveare’s efforts to expose the bug highlight a common problem in the world of cybersecurity. Companies often do not provide a way to alert you to security vulnerabilities, such as making your email address public. This can make it difficult for security researchers to publicly reveal active security flaws, due to concerns that revealing the details could put users’ data at risk.

Ming Lee, a lawyer representing Bluspark, told TechCrunch on Tuesday that the company is “confident in the steps taken to mitigate the potential risks arising from the researchers’ findings” but did not comment on the details of the vulnerability or its fix. If so, identify which third-party evaluation company was used. Or comment on its specific security practices.

In response to TechCrunch’s questions, Bluspark declined to say whether it was able to confirm whether shipments to customers had been maliciously exploited by someone with the bug. Lee said there is “no indication of customer impact or malicious activity resulting from the issues identified by our researchers.” Bruce Spark declined to say what evidence was needed to reach that conclusion.

Lee said Bluspark is planning to introduce a disclosure program that would allow outside security researchers to report bugs and flaws to the company, but those discussions are still ongoing.

Bluspark CEO Ken O’Brien did not comment for this article.

To contact this reporter securely, use Signal using username zackwhittaker.1337.


Source link

#Aceleradoras #CapitalRiesgo #EcosistemaStartup #Emprendimiento #InnovaciónEmpresarial #Startups
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleYouTube now offers a way for parents to block their kids from watching short videos
Next Article Researchers null-root over 550 Kimwolf and Aisuru botnet command servers
user
  • Website

Related Posts

YouTube now offers a way for parents to block their kids from watching short videos

January 14, 2026

Tesla will now only offer fully self-driving (with supervision) subscriptions

January 14, 2026

Meta reportedly lays off 10% of Reality Labs staff

January 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

US freight technology company puts its shipping system and customer data on the web

YouTube now offers a way for parents to block their kids from watching short videos

AI agents are becoming a privilege escalation path

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.