Thursday, May 15, 2025
HomeData BreachIndian Aadhaar Details Exposed in Public by More than 200 Government Websites

Indian Aadhaar Details Exposed in Public by More than 200 Government Websites

Published on

SIEM as a Service

Follow Us on Google News

Around 200 websites are publically Exposed the AADHAAR Card’s information that contains  More than 1 Billion Indian’s Personal Identity information such as names and addresses of some Aadhaar beneficiaries.

UIDAI is mandated to issue an easily verifiable 12 digit random number as Unique Identity as Aadhaar to all Residents of India.

This program wants each and every citizen to have a unique number which involves issuing an Aadhar number as well as one Aadhar card. This should also be linked to other key services like pension schemes or their bank accounts.

- Advertisement - Google News

Also Read:  Pentagon’s Data Leak Exposed 1.8 Billion of Social Media Surveillance Data

A Report from RTI, Said it was found that approximately 210 websites of a central government, state government departments including educational institutes were displaying the list of beneficiaries along with their name, address, other details and Aadhaar numbers for information of general public.

The UIDAI took note and got the Aadhaar data removed from the said websites, it said in reply to the RTI application.

“UIDAI has a well-designed, multi-layer approach robust security system in place and the same is being constantly upgraded to maintain the highest level of data security and integrity,” the RTI reply said.

“Various policies and procedures have been defined, these are reviewed and updated continually thereby appropriately controlling and monitoring any movement of people, material, and data in and out of UIDAI premises, particularly the data centres,” the UIDAI said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Enisa Launched New European Vulnerability Database to Strengthen Cybersecurity

European Union Agency for Cybersecurity (ENISA) has officially launched the European Vulnerability Database (EUVD),...

Xanthorox Emerging BlackHat AI Tool Empowering Hackers in Phishing and Malware Campaigns

Artificial intelligence platform named Xanthorox has emerged as a potent new tool for cybercriminals,...

Node.js Vulnerability Enables Attackers to Crash Processes and Disrupt Services

Node.js project has released a critical security update addressing several vulnerabilities that could allow...

Russian Hackers Exploit XSS Vulnerabilities to Inject Malicious Code into Email Servers

A sophisticated cyberespionage campaign, dubbed Operation RoundPress, has been uncovered by cybersecurity researchers at...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack

British retail giant Marks & Spencer has officially confirmed that customer personal data was...

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...

Cyberattackers Targeting IT Help Desks for Initial Breach

Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into...