In a landmark data breach incident, cybersecurity researcher Jeremiah Fowler uncovered a massive 1.17 TB data leak that exposed billions of records from a Chinese IoT grow light company, Mars Hydro. The database, which contained a staggering 2.7 billion records, revealed a plethora of sensitive information, including Wi-Fi network names, passwords, IP addresses, device IDs, and email addresses.
According to Fowler’s detailed blog post for vpnMentor, which was shared with Hackread.com, the exposed database contained folders dedicated to logging, monitoring, and error records of IoT devices worldwide. Through a sample analysis, it was revealed that over 100 million records across 13 folders contained not just Wi-Fi network names and passwords, but also IP addresses, unique device identifiers, and information about the operating systems used to manage these IoT products.
Further investigation into the database linked it to LG-LED SOLUTIONS LIMITED, a California-registered company. The API details and URLs associated with LG-LED SOLUTIONS, Mars Hydro, and Spider Farmer were also found within the exposed data. Specifically labeled records such as “Mars-pro-iot-error” or “SF-iot-error” suggested a direct connection to these product lines.
Some of the alarming findings in the database included error logs that contained potentially sensitive information like tokens, application versions, device types, and IP addresses, in addition to the Wi-Fi credentials. After Fowler promptly notified LG-LED SOLUTIONS and Mars Hydro about the breach, the database was secured within hours. Mars Hydro confirmed that the Mars Pro app was their official product but questions remain about the ownership and management of the leaked database.
The exposure of such vast amounts of information through the Mars Pro app and connected devices raises concerns about potential misuse, surveillance, man-in-the-middle attacks, and manipulation. Recent incidents, such as the activities of the Matrix hacker group utilizing exposed IoT devices for DDoS botnets, highlight the ongoing risks associated with vulnerable IoT ecosystems.
Studies have shown that a significant percentage of IoT devices are highly vulnerable, with a majority of transmitted data being unencrypted. To address these risks, it is crucial for IoT device manufacturers and app developers to prioritize data protection, avoid plain text logging, implement encryption, secure internal cloud storage, and conduct regular security audits and penetration testing.
As the digital landscape continues to evolve, safeguarding sensitive information stored in IoT devices and networks is paramount to ensuring the privacy and security of users worldwide. The exposure of billions of records in this data leak serves as a stark reminder of the importance of robust cybersecurity measures in the face of escalating cyber threats.

