Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

AI security company DepthFirst announces $40 million Series A

January 14, 2026

US freight technology company puts its shipping system and customer data on the web

January 14, 2026

Man pleads guilty to hacking US Supreme Court filing system

January 13, 2026
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    Bitfinex hacker Ilya Lichtenstein appreciates President Trump's early release

    January 3, 2026

    According to data, hackers stole over $2.7 billion in cryptocurrencies in 2025

    December 23, 2025

    Coinbase resumes user onboarding in India, plans to introduce fiat currency next year

    December 7, 2025

    New report examines how David Sachs benefits from Trump administration role

    November 30, 2025

    Why Benchmark made a rare crypto bet on trading app Fomo with $17 million Series A

    November 6, 2025
  • Security

    AI security company DepthFirst announces $40 million Series A

    January 14, 2026

    US freight technology company puts its shipping system and customer data on the web

    January 14, 2026

    Man pleads guilty to hacking US Supreme Court filing system

    January 13, 2026

    Fintech company Betterment confirms data breach after hackers sent fake crypto fraud notifications to users

    January 12, 2026

    Instagram says there was no breach despite password reset requests

    January 11, 2026
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Why venture capitalists think consumer AI isn't living up to the hype

    January 13, 2026

    Superorganism raises $25 million to support biodiversity startups

    January 13, 2026

    These Gen Zers raised $11.75 million to put Africa's defense back into African hands.

    January 12, 2026

    The venture that devoured Silicon Valley raised another $15 billion.

    January 9, 2026

    Why this VC thinks 2026 will be the “Year of the Consumer”

    January 8, 2026
TechBrunchTechBrunch

US freight technology company puts its shipping system and customer data on the web

TechBrunchBy TechBrunchJanuary 14, 20267 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Over the past year, security researchers have been urging the global shipping industry to strengthen its cyber defenses after a spate of cargo thefts by hackers. Researchers say they witnessed an elaborate hack that targeted a logistics company to hijack a large number of customers' products and redirect them into the hands of criminals, marking an alarming collusion between hackers and real-life organized crime groups.

There's a stolen e-cig delivery truck here, and there's a suspected lobster robbery.

One of the lesser-known but important US maritime technology companies has spent the past few months patching its systems after a number of simple vulnerabilities were discovered. The vulnerability inadvertently left the door to its shipping platform wide open to anyone on the internet.

The company is New York-based Bluspark Global, whose shipping and supply chain platform Bluvoyix enables hundreds of large companies to transport products and track shipments as they move around the world. Bluspark may not be a household name, but the company powers a large portion of freight transportation around the world, including retail giants, grocery stores, furniture manufacturers, and more. The company's software is also used by several other companies that partner with Bluspark.

Bluspark told TechCrunch this week that the security issue has now been resolved. The company fixed five flaws in its platform, including the use of cleartext passwords by employees and customers and the ability to remotely access and manipulate Bluvoyix's shipping software. The flaw exposed access to all customer data, including shipping records dating back decades.

But for Eaton Zveare, the security researcher who discovered the vulnerability in Bluspark's systems in October, alerting the company to the security flaw took longer than discovering the bug itself because Bluspark had no identifying means to contact him.

In a now-published blog post, Zveare said he submitted details of five flaws in Bluspark's platform to the Maritime Hacking Village. Maritime Hacking Village is a nonprofit organization that works to secure maritime space and helps researchers notify companies in the maritime industry of active security flaws, as in this case.

Weeks later, and after multiple emails, voicemails, and LinkedIn messages, the company had not responded to Zveare. In the meantime, anyone on the Internet could exploit this flaw.

As a last resort, Zveare contacted TechCrunch and tried to get them to flag the issue.

TechCrunch sent an email to Bluspark CEO Ken O'Brien and senior executives at the company alerting them to the security flaw, but did not receive a response. TechCrunch subsequently sent an email to customers of Bluspark, a publicly traded US retailer, warning them of the upstream security issue, but also received no response.

When TechCrunch sent a third email to Bluspark's CEO, it included a partial copy of his password to demonstrate the severity of the security flaw.

A few hours later, TechCrunch received a response from the law firm representing Bluspark.

Plaintext passwords and unauthenticated APIs

Zveare explained in a blog post that he discovered the vulnerability after first visiting a Bluspark customer's website.

Zubair wrote that the client's website had a contact form where prospective customers could inquire. By viewing the web page's source code in the browser's built-in tools, Zveare realized that the form sent the customer's message through Bluspark's servers via an API. (APIs allow two or more connected systems to communicate with each other over the Internet; in this case, your website's contact form and your Bluspark customer's inbox.)

Because the email sending code was embedded in the web page itself, anyone could modify the code and exploit this form to send malicious emails, including phishing scams originating from real Bluspark customers.

Zveare pasted the API's web address into his browser, which loaded a page containing automatically generated documentation for the API. This web page was a master list of all the actions that could be performed with the company's API, such as requesting a list of users with access to Bluspark's platform and creating new user accounts.

The API documentation page also included a feature that allowed anyone to “test” the API by submitting commands to retrieve data from Bluspark's servers as a logged-in user.

Zveare discovered that the API does not require passwords or credentials to return sensitive information from Bluspark's servers, despite the page claiming that authentication is required to use it.

Using only a list of API commands, Zveare was able to retrieve a large number of user account records for employees and customers using Bluspark's platform in a completely unauthenticated manner. This included usernames and passwords displayed unencrypted and in clear text, including accounts associated with the platform's administrators.

Once an attacker has obtained the administrator's username and password, they could log into this account and run rampant. Zveare, a bona fide security researcher, could not use the credentials because it is illegal to use someone else's password without permission.

The API documentation included a command that would allow anyone to create a new user with administrator access, so Zveare did just that and gained unrestricted access to the Bluvoyix supply chain platform. Zveare said the administrator access level allowed him to view customer data dating back to 2007.

Zveare discovered that when he logged in with this newly created user, each API request was wrapped with a user-specific token. This was to ensure that each time a user clicked a link they were actually granted access to the portal page. However, since no token was required to complete the command, Zveare was able to send the request without using a token at all, further confirming that the API was not authenticated.

Bugs fixed and company planning new security policies

After establishing contact with Bluspark's law firm, Zveare gave TechCrunch permission to share a copy of his vulnerability report with its representatives.

Days later, the law firm announced that Bluspark was working to repair most of the deficiencies and hire a third-party firm for an independent evaluation.

Zveare's efforts to expose the bug highlight a common problem in the world of cybersecurity. Companies often do not provide a way to alert you to security vulnerabilities, such as making your email address public. This can make it difficult for security researchers to publicly reveal active security flaws, due to concerns that revealing the details could put users' data at risk.

Ming Lee, a lawyer representing Bluspark, told TechCrunch on Tuesday that the company is “confident in the steps taken to mitigate the potential risks arising from the researchers' findings” but did not comment on the details of the vulnerability or its fix. If so, identify which third-party evaluation company was used. Or comment on its specific security practices.

In response to TechCrunch's questions, Bluspark declined to say whether it was able to confirm whether shipments to customers had been maliciously exploited by someone with the bug. Lee said there is “no indication of customer impact or malicious activity resulting from the issues identified by our researchers.” Bruce Spark declined to say what evidence was needed to reach that conclusion.

Lee said Bluspark is planning to introduce a disclosure program that would allow outside security researchers to report bugs and flaws to the company, but those discussions are still ongoing.

Bluspark CEO Ken O'Brien did not comment for this article.

To contact this reporter securely, use Signal using username zackwhittaker.1337.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

AI security company DepthFirst announces $40 million Series A

January 14, 2026

Man pleads guilty to hacking US Supreme Court filing system

January 13, 2026

Fintech company Betterment confirms data breach after hackers sent fake crypto fraud notifications to users

January 12, 2026

Instagram says there was no breach despite password reset requests

January 11, 2026

Critics slam spyware maker NSO's transparency claims as it aims to enter the US market

January 8, 2026

Internet collapses in Iran amid protests over economic crisis

January 8, 2026

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

AI security company DepthFirst announces $40 million Series A

January 14, 2026

US freight technology company puts its shipping system and customer data on the web

January 14, 2026

Man pleads guilty to hacking US Supreme Court filing system

January 13, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2026 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.