{"id":29786,"date":"2019-10-18T22:28:03","date_gmt":"2019-10-18T22:28:03","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/"},"modified":"2019-10-18T22:28:03","modified_gmt":"2019-10-18T22:28:03","slug":"deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/","title":{"rendered":"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope&#8217;s Click to Pray eRosary app"},"content":{"rendered":"<div readability=\"29.081761006289\">\n<h2>Vatican coders exorcise API gremlins but, we must confess, they missed one little monster&#8230;.<\/h2>\n<p> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/10\/18\/handout_erosary_gadget.jpg?x=442&amp;y=293&amp;crop=1\" alt=\"The Catholic Church's erosary\" width=\"442\" height=\"293\" class=\"article_img\"><\/p>\n<p>Hole-y spirit &#8230; Catholic Church\u2019s eRosary gizmo<\/p>\n<\/div>\n<div id=\"body\" readability=\"141.4922813036\">\n<p><strong class=\"trailer\">Exclusive<\/strong> The technology behind the Catholic Church\u2019s latest innovation, an electronic rosary, is so insecure, it can be trivially hacked to siphon off worshipers&#8217; personal information.<\/p>\n<p>The <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.vaticannews.va\/en\/vatican-city\/news\/2019-10\/click-pray-rosary-smart-digital-device-world-peace.html\">eRosary<\/a>, which went on sale this week at just $109 (\u00a385) a pop, consists of ten metallic beads, and a metal cross that\u2019s Bluetooth enabled, has wireless charging, and is motion sensitive.<\/p>\n<p>When the wearer makes the sign of the cross with the rosary, the accompanying Click to Pray app on their paired phone or tablet activates: this software suggests which rosary movements to make, and which prayers to mumble. It can also be configured to remind believers that it&#8217;s time for a chat with God.<\/p>\n<p>However, infosec bods at UK-based Fidus Information Security quickly uncovered flaws in the backend systems used by the Click to Pray app, which is available for iOS and Android. The security vulnerabilities are more embarrassing than life-threatening.<\/p>\n<h3 class=\"crosshead\"><span>&#8216;Bodged&#8217;<\/span><\/h3>\n<p>\u201cOne of our researchers decided to check out the code, and in just 10 minutes found some glaring issues,\u201d Andrew Mabbitt, founder of Fidus, told <em>The Register<\/em> on Friday. \u201cIt looks like someone\u2019s taken a fitness band app and bodged it together with existing code that leaves any user account hackable.\u201d<\/p>\n<p>The Fidus egghead who found the flaw, Chris, explained there were two key issues. Firstly, when you install the Click to Pray app, you&#8217;re asked to create an online account. This profile is protected by a four-digit PIN. Yes, just four digits to log into your profile from the Click to Pray app. This is trivial to brute-force because you are given unlimited retries, and there is no mechanism to slow the process.<\/p>\n<p>Secondly, the application talks to its backend systems via API calls: sendPIN and resetPIN. Due to a vulnerability in the code, it was possible to send over a user&#8217;s email address via this API and retrieve the corresponding account PIN in a readable format. That meant if someone submitted a stranger&#8217;s email address, they could gain access to the corresponding Click to Pray profile, if one existed.<\/p>\n<p>Fidus revealed more information <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/fidusinfosec.com\/clicktopray-erosary-account-takeover\/\">here<\/a>, on its website, on Friday.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/04\/25\/pope_francis.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"pope\"><\/p>\n<h2 title=\"Microsoft prez Brad Smith talks AI and ethics with the Pope\">Boss of venerable sect with millions of devoted followers meets boss of venerable sect with&#8230; yeah, you get the idea<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/02\/14\/microsoft_meets_pope\/\"><span>READ MORE<\/span><\/a><\/div>\n<p><em>The Register<\/em> set up a dummy account on the app, using the name Satan, and, sure enough, it was hijacked within minutes by the Fidus team. While accounts do not store anything too sensitive, such as financial information, they do contain personally identifying data \u2013 such as folks&#8217; names and physical descriptions. In countries like China, where Catholics aren\u2019t too popular, this sort of data could be damaging if exposed.<\/p>\n<p>Father Frederic Fornos, the International Director Pope&#8217;s Worldwide Prayer Network, told <em>The Register<\/em> that as soon as he was alerted to the security weaknesses by Fidus on Thursday, he put Vatican coders on the job to fix it, and pledged to, miracles upon miracles, have the holes patched over within 24 hours.<\/p>\n<p>And according to Fidus, the developers have already shored up the software, kind of. \u201cThey have fixed the [API] issue, but in a really convoluted way,\u201d Mabbitt told us.<\/p>\n<p>\u201cNow when the API call is made, you can\u2019t extract the four-digit PIN [from the data sent back]. But there is still no protection against brute forcing the PIN, so that\u2019s definitely still an option.\u201d<\/p>\n<p>A Vatican spokesperson told <em>The Register<\/em> the API shortcomings were also spotted by a security researcher going by the pseudonym <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/fs0c131y\">Elliot Alderson<\/a>, who, like Fidus, privately reported the bugs but also sent the Vatican code to fix the issue. You can read Alderson&#8217;s full report <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/regmedia.co.uk\/2019\/10\/18\/erosary.pdf\">here<\/a> [PDF].<\/p>\n<p>The eRosary has only just been announced, so just a few thousand people are using the thing, judging from the Android store stats. Until the app is completely fixed, those who feel the need for electronic prayer monitoring should hold off and stick to the more traditional ways of practicing their faith. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7798\/how-to-process-wrangle-analyze-and-visualize-your-data-with-three-complementary-tools?td=wptl1858\">How to Process, Wrangle, Analyze and Visualize your Data with Three Complementary Tools<\/a><\/p>\n<\/div>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/10\/18\/vatican_erosary_insecure\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vatican coders exorcise API gremlins but, we must confess, they missed one little monster&#8230;. Exclusive\u00a0 The technology behind the Catholic Church\u2019s latest innovation, an electronic rosary, is so insecure, it can be trivially hacked to siphon off worshipers&#8217; personal information.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29787,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-29786","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope&#039;s Click to Pray eRosary app 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope&#039;s Click to Pray eRosary app 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-18T22:28:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"442\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope&#8217;s Click to Pray eRosary app\",\"datePublished\":\"2019-10-18T22:28:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/\"},\"wordCount\":723,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/\",\"name\":\"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope's Click to Pray eRosary app 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg\",\"datePublished\":\"2019-10-18T22:28:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg\",\"width\":442,\"height\":293},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope&#8217;s Click to Pray eRosary app\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope's Click to Pray eRosary app 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/","og_locale":"en_US","og_type":"article","og_title":"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope's Click to Pray eRosary app 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-18T22:28:03+00:00","og_image":[{"width":442,"height":293,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope&#8217;s Click to Pray eRosary app","datePublished":"2019-10-18T22:28:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/"},"wordCount":723,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/","url":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/","name":"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope's Click to Pray eRosary app 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg","datePublished":"2019-10-18T22:28:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app.jpg","width":442,"height":293},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/deus-ex-hackina-it-took-just-10-minutes-to-find-data-divulging-demons-corrupting-popes-click-to-pray-erosary-app\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope&#8217;s Click to Pray eRosary app"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29786"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29786\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29787"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}