Breach Notification , Identity & Access Management , Security Operations

Thingiverse Breach: 50,000 3D Printers Faced Hijacking Risk

Exposed OAuth Tokens Have Since Been Revoked, Mitigating Takeover Threat
Thingiverse Breach: 50,000 3D Printers Faced Hijacking Risk
MakerBot Replicator 3D printer

A data breach affecting MakerBot's Thingiverse 3D printing repository website is far bigger than what the company has acknowledged, a former employee claims.

See Also: OnDemand | Password Management: Securing Hybrid Work for the Long Haul

The breach likely affects more than 2 million people whose usernames at minimum were leaked, says TJ Horner, a software engineer and security aficionado who has analyzed the data. Horner worked at MakerBot until last year.

Horner says the data also includes OAuth tokens that until recently could have been used to remotely access MakerBot 5th Generation printers and later models. Those printers have video cameras, so Horner found it was also possible to view the printers' video feeds, including Horner's own MakerBot Method X printer.

Horner's own MakerBot Method X printer and its video feed were accessible using the leaked OAuth tokens.

Additional mischief may have been possible. A malicious attacker could have sent an erroneous schematic to a 3D printer that could, for example, have broken a printer's stepper motors, Horner says. The tokens also granted access to a user's Thingiverse account, with read and write access.

Those OAuth tokens have now been invalidated by MakerBot, Horner says.

MakerBot maintains that less than 500 users were affected by the data breach. It has also said the data breach consisted of non-production, non-sensitive information that was mostly testing data. It also maintains that all affected users have been notified.

But MakerBot's figures have been disputed not only by Horner but also Troy Hunt, the creator of the free Have I Been Pwned data breach notification site, which alerts subscribers whenever their email address appears in a known breach. Hunt's service has sent 10,646 notifications to subscribers who were affected by the Thingiverse breach. In total, Hunt says the breach exposed 228,000 unique email addresses, which he has loaded into Have I Been Pwned.

Hunt, who uses Thingiverse for his own projects, has expressed frustration about the difficulty in alerting MakerBot and Thingiverse about the breach, as well as the company's continuing lack of full disclosure.

"What I find most noteworthy about the incident isn't the breach itself but the handling," Hunt says, as well as MakerBot's "inability to be transparent and honest about the impact and scope."

MakerBot officials couldn't be immediately reached for comment about Horner's findings. Information Security Media Group alerted MakerBot to the exposed authentication tokens on Friday, and the company subsequently invalidated the tokens.

MySQL Database Leak

Thingiverse is a website where users can share digital designs for objects that can be printed using 3D printers. While the site is popular, some critics have alleged that the site's infrastructure has not been kept sufficiently updated.

The breach occurred after someone going by the nickname Pompompurin discovered Thingiverse had left a 36GB MySQL database exposed to the internet in an Amazon S3 bucket. The data then turned up on a well-known forum for buying and selling data breaches (see Thingiverse Data Leak Affects 228,000 Subscribers).

The leaked data includes email addresses, IP addresses, usernames, physical addresses, full names, direct messages between users and moderation logs. There are also SHA1 hashes of passwords as well as bcrypt hashes. For years, security experts have warned that the SHA1 hashing algorithm should not be used to handle passwords, since it is relatively easy to brute-force the hashes it generates to recover plaintext passwords.

Horner, who was formerly a full stack software engineer with MakerBot, has carefully reviewed the exposed data. The data is a MySQL database snapshot from October 2020 that contains Thingiverse's staging database. But Horner notes that there is also an entire production database within the staging database.

The production data runs up until May 15, 2018, and contains a total of 2,079,011 users, Horner says. Horner also shared a hypothesis about why MakerBot may have underestimated the number of users affected.

When the production data was imported, MakerBot modified those more than 2 million email addresses, Horner says. That likely made the information appear to be test data when it fact it was real data.

Thus, those affected users haven't been notified. Accordingly, Horner says MakerBot needs to correlate the impacted user IDs from the staging database with those in the production database, and then send a notification to those email addresses in the staging data.

If that doesn't occur, Horner has also created a tool allowing people to query if they're affected by the breach.

Vulnerable Printers

One perhaps surprising aspect of the breach was that it didn't just expose user details, but also OAuth tokens for individual 3D printers. MakerBot has not publicly disclosed that such tokens got leaked, although they have since been invalidated, meaning the leak should pose no further risk.

OAuth tokens for Horner's MakerBot Method X 3D printer were part of the breached data.

While at MakerBot, Horner's development work included managing the internet-connectivity software on the 50,000 of the 3D printers it had sold. That group of printers would have been vulnerable to takeovers because of this data breach, Horner says.

"Anyone with one of these compromised tokens has full control over the printer if it's connected to the internet," Horner says.

Horner says the affected printers would have included the Replicator 5th Gen, Replicator Mini, Replicator Z18, Replicator+, Replicator Mini+, all of the Method-series printers and MakerBot Sketch.

OAuth tokens for Horner's MakerBot Method X 3D printer were in the data, which at that time - prior to being invalidated - still worked with the Thingiverse API and Thingiverse's remote printer access API, which is called Reflector, Horner says. By pinging the APIs with a token, the API would return a list of printers that are authorized to a particular user, Horner says.


About the Author

Jeremy Kirk

Jeremy Kirk

Managing Editor, Security and Technology, ISMG

Kirk is a veteran journalist who has reported from more than a dozen countries. Based in Sydney, he is Managing Editor for Security and Technology for Information Security Media Group. Prior to ISMG, he worked from London and Sydney covering computer security and privacy for International Data Group. Further back, he covered military affairs from Seoul, South Korea, and general assignment news for his hometown paper in Illinois.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.