Friday, March 29, 2024

120 Million Unique Taxpayer ID Numbers Exposed Online From Misconfigured Servers

120 Million Unique CPF of Brazilian citizens exposed online form a misconfigured Apache server. The highly personal information is openly available for everyone.

The exposed data contains sensitive information that linked CPF includes banks, loans, repayments, credit and debit history, voting history, full name, emails, residential addresses, phone numbers, date of birth, family contacts, employment, voting registration numbers, contract numbers, and contract amounts.

The publically available misconfigured servers are discovered by InfoArmor Threat Intelligence team back in March of 2018 and in April 2018 InfoArmor contacted the Email address registered with one of the hosts of the SQL server.

Researchers also found a swap with the files, “an 82 GB file, had been replaced by a raw .sql file 25 GB in size, though its filename remained the same. This swap suggests a human intervened.”

The exposed archive contains file sizes ranges from 27M to 82 gigabytes. Also, the index file has been renamed from “index.html” to “index.html_bkp,” which makes the file’s to be accessible publically.

120 million

By the end of the month, the server has been fixed and all the data has been secured and it functional with the website with an authenticated website alibabaconsultas.com, reads the blog post.

“With the mad rush to share tenant cloud services, we are seeing a tremendous amount of leaked data that is potentially 10 times greater than actual threat actor activity,” says Christian Lees, chief intelligence officer at InfoArmor.

“It is safe to assume that any intelligence organization or cybercrime group with reasonable collection capabilities and expertise will have captured this data. This data could very likely be used against the population of Brazil, the nation of Brazil, or any nations hosting people who have a CFP”, reads the report.

Related Read

66 Million Users Personal Data Exposed From Unprotected MongoDB Database

Hackers Stolen 500 Million Guests Personal Information From Starwood Hotels Guest Reservation Database

Website

Latest articles

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles