Wednesday, December 4, 2024
spot_img

7.26 million records of BHIM user data leaked: Report

Date:

Share post:

spot_img
spot_img

Security researchers have discovered that about 7.26 million records linked to users of mobile payments app BHIM were left exposed to the public by a website.
The exposed data included sensitive information such as names, dates of birth, age, gender, home address, caste status and Aadhaar card details, among others, said the report from VPN review website vpnMentor.
“The scale of the exposed data is extraordinary, affecting millions of people all over India and exposing them to potentially devastating fraud, theft, and attack from hackers and cybercriminals,” the security researchers from vpnMentor wrote in a blog post on Sunday.
Offered by the National Payments Corporation of India (NPCI), the app BHIM, or Bharat Interface for Money, was launched in 2016.
In a statement on Monday, the NPCI said that “there has been no data compromise at BHIM App.”
“We have come across some news reports which suggest data breach at BHIM App. We would like to clarify that there has been no data compromise at BHIM App and request everyone to not fall prey to such speculations. NPCI follows high level of security and an integrated approach to protect its infrastructure and continue to provide a robust payments ecosystem,” said the NPCI.
In its report, vpnMentor also said that the website that leaked the data was developed by a company called CSC e-Governance Services LTD. in partnership with the Indian government.
The issue was resolved late last month after the researchers contacted India’s Computer Emergency Response Team (CERT-In) twice in a month’s time.
“In this case, the data was stored on an unsecured Amazon Web Services (AWS) S3 bucket,” the researchers said, adding that S3 buckets are a popular form of Cloud storage across the world but require developers to set up the security protocols on their accounts.
“We reached out to the website’s developers to notify them of the misconfiguration in their S3 bucket and to offer our assistance. After not receiving a reply, we contacted India’s Computer Emergency Response Team (CERT-In), which deals with cybersecurity in the country,” they added.
It appears CSC established the website connected to the misconfigured S3 bucket to promote BHIM usage across India and sign up new merchant businesses, such as mechanics, farmers, service providers, and store owners onto the app, according to the research led by vpnMentor’s Noam Rotem and Ran Locar.
The volume of exposed data which was first discovered by the security researchers on April 23 amounted to 409GB.
“It’s difficult to say precisely, but the S3 bucket seemed to contain records from a short period: February 2019. However, even within such a short timeframe, over 7 million records had been uploaded and exposed,” said the report.
“The exposure of BHIM user data is akin to a hacker gaining access to the entire data infrastructure of a bank, along with millions of its users’ account information,” it added.(IANS)

spot_img
spot_img

Related articles

Conduct aerial survey of mined coal: HC to govt

SHILLONG, Dec 3: The state government has been asked to immediately conduct an aerial survey to find out...

Panel pokes government on ‘unlimited’ coal transport

SHILLONG, Dec 3: The one-man committee of retired Judge BP Katakey, in its 26th interim report, asked the...

God’s caste? Protests erupt in Mathura over claims that Lord Krishna was a Jat

UP Police register FIR, begin investigation Mathura (UP), Dec 3: Wall inscriptions claiming that Lord Krishna was a Jat...