Thu, Mar 13, 2025

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

In today’s interconnected world, the convergence of cyber and physical security has become increasingly critical, particularly for high-profile individuals. The recent breach of Gravy Analytics’ geolocation data highlights the emerging threat of geolocation vulnerability and its potential impact on physical security. High-profile individuals are now more than ever reassessing the extensiveness of their personal security measures, especially in the aftermath of incidents such as the UnitedHealthcare CEO shooting. This article aims to shed light on these vulnerabilities, emphasizing the importance of understanding one’s digital footprint and implementing proactive measures to mitigate risks.

Malicious actors targeting geolocation data for criminal or wartime exploitation present a significant threat to high-profile individuals. The ability to track precise real-time locations makes these individuals vulnerable. Integrating digital and physical security measures enhances protective strategies, promoting a proactive approach rather than a reactive one.

These digital issues are significant and ongoing. In January 2025, Gravy Analytics experienced a major breach that resulted in the compromise of its geolocation data and internal database. Since June 2011, Gravy Analytics has been collecting data and monitoring over a billion mobile devices daily. While geolocation data is intended to enhance convenience and enjoyment, the hack raises concerns about the potential misuse of compromised data by malicious actors to target high-profile individuals. Gravy Analytics is known as one of the largest providers of real-world location intelligence for business and advertising services. Its intelligence is used by commercial clients and U.S. government agencies such as the IRS, FBI, and U.S. Immigration and Customs Enforcement.

In recent years, geolocation technology and tracking incidents resulting in legal and ethical controversies have repeatedly made headlines. The proliferation of geolocation technology on mobile devices has led to costly and deadly incidents for militaries, intelligence services, and law enforcement agencies worldwide. The Gravy Analytics incident is one of many stark examples of risks and impacts executives and other high-profile individuals are facing when they have an exposed digital footprint. Other incidents include:

  • The 2017 Strava Breaches

This popular fitness app faced scrutiny for its invasive tracking features that led to military security breaches and deaths in November 2017. Strava had an estimated 95 million active users in 2021.

  • The 2022 Ukraine-Russian Conflict

This conflict has highlighted multiple instances of social media, popular dating apps, and mobile app tracking features being used with deadly consequences, with victims becoming targets of aerial bombardment.

  • The 2024 Paris Olympics

The threat actor Zeus launched a doxing campaign on social media platform Telegram against Israeli athletes. The threat actor stalked the Israeli team’s social media accounts for locations and incited physical violence against them.

  • U.S. Federal Air Tracking

Regulations allow for high-profile individuals such as Elon Musk and Mark Zuckerberg to be tracked through the movements of their private jets.

Mitigation Strategies

While we enjoy the benefits that mobile apps bring to our lives, being aware of the vulnerabilities, understanding your personal digital footprint, and knowing what can be done to minimize risk are prudent security considerations and good first steps toward having mitigation strategies to manage these threats.

  • Management of Digital Footprint

By understanding an individual’s digital footprint, one can see who and what is vulnerable. Mitigating measures to protect privacy include limiting information on social media accounts, enabling privacy settings when available, using caution when accepting follow requests from other users, and turning off all location features. Professional monitoring services are available that are aimed at removing personally identifiable information (PII) from open-source and public-record websites.

  • Threat Assessment

Capabilities exist to assess risk and identify and evaluate potential threats based on the individual’s profile, location, activities, and current geopolitical situations. Baseline assessments, coupled with a persistent monitoring effort, identify points of intervention where a threat actor might communicate their intentions so that proactive measures can be taken.

  • Physical Security

Digital protective intelligence assessments are intended to support the decision-making of executives and their protection services. When determined necessary, physical security controls can be implemented, including access control, perimeter security, surveillance systems, and secure transportation routes or arrival and departure areas.

  • Behavioral Profiling: Enhanced, Proactive Victim Selection and Victimology Analysis

Behavioral profiling is a critical component in understanding the threats and risks posed to executives by offenders who use cyber technology to facilitate physical harm. By analyzing digital footprints, online discourse, and threat actor behaviors, profiling helps identify patterns of intent, escalation, and modus operandi. Threats are assessed through behavioral indicators to determine the likelihood of real-world action. This proactive approach enhances executive protection by anticipating, mitigating, and neutralizing emerging threats before they manifest into physical danger.

Behavioral profiling also augments threat assessment and risk management with deep, proactive cyber victimology and cyber victim selection assessment. Cyber victimology analysis plays a crucial role in modern threat assessments by identifying how individuals, particularly high-profile executives, may be targeted based on their digital exposure, behavioral patterns, and vulnerabilities. Attackers often use mobile advertising technology, geolocation data, and publicly available personal information to conduct reconnaissance, predict routines, and exploit security gaps. By analyzing past victimization patterns, digital footprint exposure, and attacker methods, cyber victimology helps assess the likelihood and severity of targeted threats. This proactive approach informs executive protection strategies, enabling organizations to mitigate risks by reducing digital exposure, implementing stronger countermeasures, and pre-emptively identifying potential aggressors before threats escalate into real-world harm.

Similarly, cyber victim selection assessment is a strategic process to assess how threat actors are identifying and targeting individuals based on their digital exposure, behavioral patterns, and perceived vulnerabilities. High-profile executives are particularly at risk, as attackers exploit mobile advertising technology, geolocation tracking, and publicly available data to map routines, assess security weaknesses, and determine the most opportune moments for violent engagement. Factors such as online presence, personal data leaks, and corporate affiliations influence the victim selection process—making digital footprint management and mitigation critical to executive protection. By understanding how attackers profile and select their victims, organizations can implement targeted risk mitigation strategies, reduce exposure, and disrupt threat actor reconnaissance efforts before an attack. 

Facts of the Hack

Gravy Analytics, headquartered in One Loudoun, Virginia, is a real-world location intelligence provider for business marketers. After merging with Norwegian location tracking company Unacast, it became the leading provider of its kind.

In January 2025, a threat actor identified as “Nightly” claimed to have exfiltrated 17 TB of data from the company’s network, originating from over 12,373 brands. Following is a timeline of the breach and related details.

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

Figure 1: Nightly’s Initial Post to the Deep and Dark Web Forum XSS (Taken January 14, 2025)

Physical Security Implications

For threat actors, predictable behavior is an advantage. So, the Gravy Analytics incident is particularly concerning because of the company’s specialization in collecting and analyzing location data originating from participating mobile apps. It has been reported that the breached data contained extensive smartphone location data, including latitude coordinates, longitude coordinates, timestamps, and device numbers.

In the initial post to XSS, an interested individual with the username “Bio” described each location signal as being associated with a unique mobile advertising ID for each mobile device within the dataset. The volume of affected apps has been reported to be about 12,373 and includes brands such as Wattpad, 9GAG, Pixiv, Xiaomi, AVG, and Kik.

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

Figure 2: List of Apps Impacted by the Gravy Analytics Breach (Taken January 14, 2025)

Multiple physical security threat implications emerged as other users on the XSS forum began noting that the Gravy Analytics data was capable of pinpointing exact locations of impacted individuals, including buildings they frequent, down to specific rooms.

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

Figure 3: Map of Locations Identified within the Sample of Gravy Analytics Data (Taken January 14, 2025)

In the past five years, there have been multiple instances in which third parties have obtained geolocation data, whether maliciously or through open sources, resulting in costly mitigation fees and successful physical threats. Many security researchers expect the Gravy Analytics breach to have irreversible consequences to physical security strategies of executives and other high-profile people.

U.S. Military Security Breach

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

Figure 4: Demonstration of Strava’s Tracking Capabilities (Taken January 14, 2024)

Strava, headquartered in San Francisco, California, is a popular fitness app that allows users to record and analyze their physical activities. The app uses GPS to track distance metrics associated with users’ workouts and doubles as a social media app for athletes to share workout routines and meet other Strava users. It includes a beacon feature, which allows users to share their real-time location with other users they are connected to on the app. 

In November 2017, security researchers discovered that active members of the U.S. military and employees of various intelligence agencies were using Strava services to track their workouts. Analysis of the Strava data points determined various users’ activity to be connected to locations of known military installations and operations headquarters around the world. There were also concerns about real identities being easily recognized through chosen usernames.

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

Figure 5: Military Installations Identified Via Strava Data

Russian-Ukraine Conflict

Since the 2022 escalation of the Russian-Ukraine conflict, there have been numerous incidents of combatants being tracked and eliminated through their mobile devices and social media apps.

On February 24, 2022, it was widely reported that Russian military personnel were appearing on dating apps, such as Tinder and Bumble, with approximated locations in Ukraine. In some cases, this led to Ukrainian women initiating phishing campaigns targeting Russian troops and military movement intelligence.

There are reports of one Ukrainian woman creating several Tinder profiles and managing to connect with 70 Russian soldiers. There were also reports of Ukrainian intelligence services creating fake accounts on various platforms to coerce Russian troops into sending off-duty photos and locations of their camps.

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

Figure 6: X Post Highlighting Geolocations Being Shared on Social Media

Paris Olympics Doxing Attacks

During the 2024 Summer Paris Olympics, it was reported that a significant majority of Israeli Olympic team members received online death threats. Multiple law enforcement authorities conducted investigations and determined the threats to have originated from a Telegram user known as “Zeus,” who explicitly stated their online harassment campaign against the Israeli Olympic team was in solidarity with Palestine.

The situation got particularly dangerous when Zeus created multiple websites releasing PII of a select group of Israeli athletes. The information included health records, home addresses, event locations, and military service records. At the time, there were growing concerns that the doxing websites would allow potential threat actors to track the whereabouts of the impacted Israeli athletes while they were in Paris.

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

Figure 7: Zeus Doxing Israeli Athletes

Tracking of High-Profile Private Planes

In December 2022, there was a public X (formerly Twitter) account with the username “Elon Jet Account.” The account focused on providing real-time tracking of Elon Musk’s private jet and travels. Musk’s jet was registered under an LLC in his name and could be monitored on social networking platforms through an online tracker, ADS-B Exchange.

The online tracker is publicly available and tracks flight paths through federal law, showing thousands of commercial and private flights all over the world. Air traffic communications are not encrypted, making it fairly easy for an adversary to identify flight destinations and listen in on flight logs.

Other high-profile people observed to be tracked at some point through ADS-B Exchange included Mark Zuckerberg and Jeff Bezos. These public sites raise security issues for executives being tracked by malicious actors.

Convergence of Cyber and Physical Security: Geolocation Data Hacks and Executive Protection Threat Implications

Figure 8: Tracking of Elon Musk’s Private Plane

Using frontline threat intelligence from handling thousands of cyber incidents every year, our Cyber Threat Intelligence Team can deliver more visibility against emerging threats and offer actionable steps to minimize risk and protect against operational and reputational damage. Our experts bring their combined experience in the U.S. Secret Service, the FBI, Fortune 100 companies, and the National Cyber Forensic Training Alliance to follow even the most obfuscated or opaque data trails.

The threat landscape is evolving day by day. Partner with Kroll to use our frontline threat intelligence and experienced incident response professionals to keep your organization safe.


Cyber and Data Resilience

Incident response, digital forensics, breach notification, security strategy, managed security services, discovery solutions, security transformation.

Digital Risk Protection

Proactively safeguard your organization’s digital assets and accelerate visibility of online threats.

Malware Analysis and Reverse Engineering

Kroll’s Malware Analysis and Reverse Engineering team draws from decades of private and public-sector experience, across all industries, to deliver actionable findings through in-depth technical analysis of benign and malicious code.


Cyber Threat Intelligence

Threat intelligence are fueled by frontline incident response intel and elite analysts to effectively hunt and respond to threats.