Wednesday, March 19, 2025
HomeData BreachHuge E-marketing Database that Contains 11 Million Sensitive Personal Records Exposed Online

Huge E-marketing Database that Contains 11 Million Sensitive Personal Records Exposed Online

Published on

SIEM as a Service

Follow Us on Google News

A huge customer database with 11 million records that containing personal details such as email, full name, gender and physical address exposed online. The data to be available from the unprotected MongoDB instance and it is open for anyone to access it.

Security researcher Bob Diachenko discovered the database containing 43.5GB large dataset with 10.999.535 email addresses along with the DNS status of the email addresses. The leaked data can be used by utilized by cybercriminals for malware and phishing campaigns.

Diachenko said that the origin of the data remains unknown and can find only a hint with a part of the email says “Yahoo_090618_ SaverSpy“.

It appears the attackers having access to the MongoDB already, Diachenko said the database was tagged as Compromised and the database containing a “Readme file” with a ransom note demanding 0.4 BTC for recovering the data, but it appears the scripts failed to encrypt the files.

Diachenko tried contacting SaverSpy which is powered Coupons.com to report the breach, but there is no response from them, However, the database has been taken offline.

Last week another Data Management Company’s misconfigured MongoDB server exposed its marketing database that contains around 445 million its customer records.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical...

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace...

11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

Cybersecurity researchers have discovered that multiple state-sponsored threat actors have been exploiting an eight-year-old...

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware....

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials

The HELLCAT ransomware group has claimed responsibility for a significant data breach at Jaguar...

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered...

Telecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Japanese telecom giant NTT Communications (NTT Com) has confirmed a data breach that compromised...