Major 1.17TB data breach puts billions of grow light users at risk
A major security lapse has led to one of the largest Internet of Things (IoT) data breaches recorded. More than 1.17 terabytes of data, containing 2.7 billion records, have been exposed due to an unprotected database belonging to the Chinese company Mars Hydro – a manufacturer of IoT -enabled grow lights used for indoor plant cultivation. This breach underscores the increasing security risks associated with IoT devices and their widespread use in homes and industries.
How the breach happened
Cybersecurity researcher Jeremiah Fowler discovered that the database was left completely open, requiring no authentication for access. The database contained highly sensitive information, exposing a vast number of users and leaving them vulnerable to cyber threats. The leaked data included:
-
User information: Email addresses, hashed passwords, and geographical locations.
-
Device logs: Remote control settings, power schedules, and real-time status updates.
-
Network details: IP addresses and potential access points to users’ WiFi networks.
-
Cloud API data: Insights into device functionality and user interactions.
The exposed data allows hackers to manipulate grow lights remotely, gain access to home networks, and even track user behaviors. Attackers could potentially hijack devices, alter their settings, or use them as gateways for larger cyberattacks. Given that Mars Hydro’s devices are widely used across multiple countries, the scale of this vulnerability is immense.
According to Fowler, the database was accessible for an unknown period before he reported the breach to vpnMentor, which then informed Mars Hydro. The company reportedly secured the database, but it remains unclear whether any malicious actors accessed or copied the data before it was taken offline. The lack of immediate transparency raises concerns about potential long-term consequences for affected users.
Consequences for users and businesses
The risks of an IoT security breach go far beyond just leaked email addresses. Hackers can exploit unsecured IoT devices in multiple ways, including:
-
Launching botnet attacks: Hijacked IoT devices can be used in large-scale DDoS (Distributed Denial-of-Service) attacks. Learn more about DDoS attacks in our detailed guide.
-
Conducting surveillance: Malicious actors can track user behavior or gain unauthorized access to connected security cameras.
-
Deploying ransomware: Cybercriminals may lock down devices and demand payment for restored access.
This incident demonstrates how poorly secured IoT devices can act as entry points into larger networks. If exploited, attackers could potentially target entire smart home ecosystems, industrial setups, or cloud-based infrastructures.
Emerging technologies to enhance IoT security
As IoT adoption continues to grow, so does the need for advanced security solutions. Traditional security measures often struggle to keep up with the sheer scale and complexity of interconnected devices. Fortunately, emerging technologies are transforming how we protect IoT ecosystems, providing more proactive and intelligent defenses against cyber threats.
To mitigate security risks, several technologies are playing a growing role in strengthening IoT security:
-
Blockchain: Provides a decentralized and secure method for device authentication.
-
AI and machine learning: Helps detect unusual activity patterns that may indicate an attack.
-
Cloud security solutions: Ensures data integrity and protection against breaches.
These innovations help organizations stay ahead of cybercriminals by proactively identifying vulnerabilities and enhancing the resilience of IoT ecosystems. As technology evolves, integrating these solutions will be critical in maintaining the security, privacy, and reliability of connected devices.
Best practices for protecting IoT devices
As the number of Internet of Things (IoT) devices grows, so do the associated security risks. These devices often serve as entry points for cybercriminals looking to exploit vulnerabilities in smart homes, workplaces, and critical infrastructure. To mitigate these threats, it's essential to follow best practices for securing IoT devices.
At Moxso, we recommend the following steps to reduce IoT security risks:
-
Use strong, unique passwords: Avoid default credentials and use a password manager. If you're unsure what a strong password is, check out our blog: How to choose a strong password for more details.
-
Regularly update firmware: Many IoT devices receive infrequent updates, leaving them vulnerable over time.
-
Restrict network access: Ensure IoT devices do not have direct access to critical systems.
-
Monitor network activity: Use security solutions to detect unusual traffic patterns.
-
Choose secure vendors: Purchase IoT products only from companies that prioritize cybersecurity.
By implementing these measures, individuals and businesses can significantly reduce the risk of IoT-related cyber threats. While no device is completely immune, proactive security practices help safeguard sensitive data, maintain privacy, and prevent costly breaches.
Lessons learned & the future of IoT Security
This breach serves as a wake-up call for businesses and consumers alike. Weak security protocols in IoT devices can turn them into entry points for cyberattacks, potentially compromising entire networks. Implementing regular software updates, stronger authentication mechanisms, and proactive security measures is essential to prevent similar breaches in the future.
Cyber threats targeting IoT devices will only continue to rise. The time to act is now – before the next major data breach occurs. Unfortunately, we’ve seen other cyber attacks before, where weak security measures have led to severe consequences. For example, Ukraine’s largest bank recently suffered a malware attack, and DeepSeek AI faced a massive cyberattack, highlighting the growing threat landscape. By learning from past incidents, organizations can strengthen their defenses and reduce the risk of becoming the next target.

Sarah Krarup
Sarah studies innovation and entrepreneurship with a deep interest in IT and how cybersecurity impacts businesses and individuals. She has extensive experience in copywriting and is dedicated to making cybersecurity information accessible and engaging for everyone.
View all posts by Sarah Krarup