Tuesday, March 4, 2025
HomeData Breach6 Million Verizon Customers Data Leaked online Due to Misconfigured File...

6 Million Verizon Customers Data Leaked online Due to Misconfigured File Repository

Published on

SIEM as a Service

Follow Us on Google News

Telecommunications giant Verizon’s Customers 6 Million Sensitive personal data leaked online due to misconfigured cloud-based file repository and this Misconfiguraton leads to exposed customer phone numbers, names, and some PIN codes publicly available online.

This Data Breach occurred due to “Human Error” and  Verizon’s Cloud-based file server was operated by Verizon’s Third Party vendor  NICE Systems.

Data Repository Belongs to unprotected  Amazon Web Services S3 bucket and Verizon used NICE Systems technology in its back-office and call center operations.

This Leak Discovered by UpGuard  ,the company — the same company that discovered leaked voter data in June.

Also Read   198 Million American Voters Personal Records Leaked In Public- Biggest Voters Data Leak Ever

Leaked Data Contain Verizon Call Center logs

Exposed data contained 6 million records of subscribers who called the phone giant’s Verizon’s customer services in the past six months and the leaked data was downloaded by anyone by easy guess web address.

An indicator of this attack was repository’s subdomain, “Verizon-sftp,” and Folders were titled from “Jan-2017” through “June-2017,” and each folder contained folders for each day of the month.

The “verizon-sftp” repository (Soruce: UpGaurd)

Each Folder Contains directories of each and every days of the month and each day’s folder contains the compressed files.

According to UpGuard , Once unzipped, the contents of these daily logging folders are revealed to be sizable text files, some as large as 23 GB and the text Files contains composed of voice recognition log files, the records of an individual’s call to a customer support line, including fields like “TimeInQueue” and “TransferToAgent.”

“Other fields and their answers, such as “CallCenterPassword,” indicate which account-holders have requested a higher standard of security for customer service calls to change account settings, allowing any potential scammers in possession of the logs to determine which customers would be easier to victimize.”

Nice Systems Unprotected  cloud server also contained data from French mobile telco Orange S.A. but unlike Verizon ,those data not as sensitive as the data stored in the Verizon directory.

UpGuard spoke person Dan O’Sullivan said, exposed PIN codes is a concern because it allows scammers to access someone’s phone service if they convince a customer service agent they’re the account holder.

Also Read   Massive WWE Data Breach Over 3 Million Fans Records Exposed

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...