Hackers claim to have compromised Gravy Analytics, the parent company of Venntel which has sold masses of smartphone location data to the U.S. government. The hackers said they have stolen a massive amount of data, including customer lists, information on the broader industry, and even location data harvested from smartphones which show peoples’ precise movements, and they are threatening to publish the data publicly.
The news is a crystalizing moment for the location data industry. For years, companies have harvested location information from smartphones, either through ordinary apps or the advertising ecosystem, and then built products based on that data or sold it to others. In many cases, those customers include the U.S. government, with arms of the military, DHS, the IRS, and FBI using it for various purposes. But collecting that data presents an attractive target to hackers.
“A location data broker like Gravy Analytics getting hacked is the nightmare scenario all privacy advocates have feared and warned about. The potential harms for individuals is haunting, and if all the bulk location data of Americans ends up being sold on underground markets, this will create countless deanonymization risks and tracking concerns for high risk individuals and organizations,” Zach Edwards, senior threat analyst at cybersecurity firm Silent Push, and who has followed the location data industry closely, told 404 Media. “This may be the first major breach of a bulk location data provider, but it won't be the last.”
In a message posted to two Gravy websites, the hackers wrote that “Personal data of millions users is affected,” according to screenshots posted on Russian cybercrime forum XSS. The forum is typically not publicly accessible but a source with access provided 404 Media with the screenshots and sample data posted by the hackers. “Company have 24h to answer or we will start to publish data,” the message continues.
The samples of data posted by the hackers include the apparent historical location of smartphones. The files contain precise latitude and longitude coordinates of the phone, and the time at which the phone was there. Some screenshots indicate what country the data has been collected from. One alphabetically ordered list mentions Mexico, Morocco, Netherlands, North Korea, Pakistan, and “Palestinian State (proposed).” That is only a snapshot of where Gravy sourced data from; one file includes location data relating to phones in Russia, and U.S. agencies have previously used such data as part of immigration operations on the country's border. (Gravy provides some of its data to subsidiary Venntel, which then works directly with those and other agencies).
Another screenshot shows classifiers that Gravy has added to collected data, such as “LIKELY_DRIVING.”
A file called “users” included in a sample of data posted by the hackers includes multiple well known companies such as Gannett, Uber, Comcast, Apple, LexisNexis, Equifax, and many more. It also specifically mentions Babel Street, which is another U.S. government contractor. This corroborates 404 Media’s earlier reporting on where Babel Street sourced its location data from, at least in part. 404 Media and a group of other outlets previously showed how Babel Street’s Locate X tool can be used to track visitors to out-of-state abortion clinics.
Demonstrating the depth of the alleged compromise, other screenshots posted by the hackers indicate access into Gravy’s infrastructure, including root access on a Gravy-associated Ubuntu server, control over Gravy’s domains, and access to Amazon S3 buckets which are often used to store massive amounts of data. In another posted message, the hackers claimed to have access since 2018.
At the time of writing, Gravy’s website is down. Usually that website redirects to Unacast, which acquired Gravy in 2023. Unacast executives did not respond to multiple requests for comment.
“For years, this data has been sold to corporate and government interests but it's never been widely available to all the threat actors targeting Western users. This type of data has been used to track visits to abortion clinics, sensitive government locations, and locations which could identify sensitive protected qualities of people like their sexual orientation,” Edwards continued. “This data could tell a threat actor where you take your kids to school, where you work, and where you spend leisure time. It's long overdue for Congress to pass a comprehensive federal privacy bill that puts safeguards on the collection of this type of sensitive data.”
In December, the FTC announced sweeping action against Gravy and Venntel, saying in a proposed order they will be banned from selling, disclosing, or using sensitive location data, except in “limited circumstances” involving national security or law enforcement. The FTC also demanded the companies delete all historic location data. The agency alleged that Gravy and Venntel violated the FTC Act by “unfairly selling sensitive consumer location data, and by collecting and using consumers’ location data without obtaining verifiable user consent for commercial and government uses.”
This piece has been updated to include a paragraph about the FTC's recent actions against Gravy and Venntel.