+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

7.26 million records of BHIM users data leaked: Report

Jun 1, 2020, 16:01 IST
IANS
New Delhi, June 1 (IANS) Security researchers have discovered that about 7.26 million records linked to users of mobile payments app BHIM were left exposed to the public by a website.
Advertisement

The exposed data included sensitive information such as names, dates of birth, age, gender, home address, caste status and Aadhaar card details, among others, said the report from VPN review website vpnMentor.

"The scale of the exposed data is extraordinary, affecting millions of people all over India and exposing them to potentially devastating fraud, theft, and attack from hackers and cybercriminals," the security researchers from vpnMentor wrote in a blog post on Sunday.

The breach was closed late last month after the researchers contacted India's Computer Emergency Response Team (CERT-In) twice in a month's time.

The BHIM website in question was developed by a company called CSC e-Governance Services LTD. in partnership with the Indian government.

Advertisement

"In this case, the data was stored on an unsecured Amazon Web Services (AWS) S3 bucket," the researchers said, adding that S3 buckets are a popular form of Cloud storage across the world but require developers to set up the security protocols on their accounts.

"We reached out to the website's developers to notify them of the misconfiguration in their S3 bucket and to offer our assistance. After not receiving a reply, we contacted India's Computer Emergency Response Team (CERT-In), which deals with cybersecurity in the country," they added.

It appears CSC established the website connected to the misconfigured S3 bucket to promote BHIM usage across India and sign up new merchant businesses, such as mechanics, farmers, service providers, and store owners onto the app, according to the research led by vpnMentor's Noam Rotem and Ran Locar.

The volume of exposed data which was first discovered by the security researchers on April 23 amounted to 409GB.

"It's difficult to say precisely, but the S3 bucket seemed to contain records from a short period: February 2019. However, even within such a short timeframe, over 7 million records had been uploaded and exposed," said the report.

Advertisement
"The exposure of BHIM user data is akin to a hacker gaining access to the entire data infrastructure of a bank, along with millions of its users' account information," it added.

Offered by the National Payments Corporation of India (NPCI), the app BHIM, or Bharat Interface for Money, was launched in 2016.

--IANS

gb/na

(This story has not been edited by www.businessinsider.in and is auto–generated from a syndicated feed we subscribe to.)
You are subscribed to notifications!
Looks like you've blocked notifications!
Next Article