Thursday, April 17, 2025
HomeData BreachZomato's Massive Data Breach About 17 Million User Record Stolen and Revealed...

Zomato’s Massive Data Breach About 17 Million User Record Stolen and Revealed in Dark web

Published on

SIEM as a Service

Follow Us on Google News

Zomato Reports a massive Data breach that, 17 Million user records were stolen. Zomato over 120 million active users in worldwide and Zomato offers details of best cities to people’s find food orders and Restaurants.

A Security team from Zomoto Discovered this biggest Data breach and reports to their registered users.

According to the report by Zomato, the Stolen data’s contain information’s such as Registered users USERNAME and  Hashed PASSWORD.

- Advertisement - Google News

since all the password contains encrypted hash format Zomato believe and report that, there is no way to reversed and Decrypt to plain text.

Data’s Disclosed in Darkweb

Hackers Released all the stolen Zomoto users information’s such as username and password into Dark web Market and fix a cost for the whole package of Zomato data for USD 1,001.43 (BTC 0.5587), reports Hackeread

Zomato's Massive Data Breach about 17 Million User Record Stolen and Revealed in Darkweb

(Credit:Hackeread)

In this case Zomoto reports to their users ,”payment related information on Zomato is stored separately from this (stolen) data in a highly secure PCI Data Security Standard (DSS) compliant vault. No payment information or credit card data has been stolen/leaked.

This leaked information contains user names and hashed passwords are registered via both app and website by zomoto users.

According to Hackread analyze the report, revealed email address checked and tried to send a password to reset email to some of the email addresses which is in the leaked sources and its revealed that they are registered with Zomato.

Zomoto reports, “Since we have reset the passwords for all affected users and logged them out of the app and website, your zomato account is secure. Your credit card information on Zomato is fully secure, so there’s nothing to worry about there.”

Also, zomato requested users to change their password for any other services where they are using the same password.

Also Read:

  1. A complete Lookback of Historical Wannacry Ransomware Cyber Attack
  2. Joomla! 3.7.1 is released to address a critical SQL Injection Vulnerability
  3. WordPress 4.7.5 released with patch for Six Major Security Issues Including CSRF & XSS
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cisco Webex Vulnerability Lets Hackers Execute Code Through Malicious Meeting Links

Cisco has disclosed a high-severity vulnerability in its widely used Webex App, warning users...

NetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate Networks

In the modern enterprise, network security teams face the daunting challenge of detecting and...

Advanced Log Correlation Techniques For Real-Time Threat Detection

Log correlation has emerged as an essential technique, enabling security teams to connect seemingly...

2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

Apple has urgently rolled out iOS 18.4.1 and iPadOS 18.4.1 to patch two zero-day...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Landmark Admin Suffers Major Breach, Exposing Data of 1.6M+ Users

Landmark Admin, LLC (“Landmark”), a Texas-based third-party administrator for life insurance carriers, has confirmed...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Hertz Data Breach Exposes Customer Personal Information to Hackers

The Hertz Corporation has confirmed that sensitive personal information belonging to customers of its...