Saturday, June 14, 2025
HomeCyber Security NewsOver 20 Million BigBasket Customers Data Exposed in DarkWeb

Over 20 Million BigBasket Customers Data Exposed in DarkWeb

Published on

SIEM as a Service

Follow Us on Google News

BigBasket(Innovative Retail Concepts Private Limited) is India’s largest online food and grocery store. It is funded by Alibaba Group, Mirae Asset-Naver Asia Growth Fund, and therefore the UK government-owned CDC group.

“Recently BigBasket became victim to a data breach,” reported Cyble. Cyble has indexed the breached information at AmiBreached.com.

The Cybel Research team found the database of Big Basket for sale in a cyber-crime market during routine Dark web monitoring, being sold for over $40,000.

- Advertisement - Google News

The leak contains a database portion; with the table name ‘member_member’. The size of the SQL file is ~ 15 GB, containing near to 20 Million user data, and is being sold for around Rs 30 lakh.

The database consists of names, email IDs, password hashes (potentially hashed OTPs), contact numbers (mobile and phone), addresses, date of birth, location, and IP addresses of login among many others. While Cyble has mentioned “passwords”, the corporate uses a one-time password sent through SMS which keeps on changing every time a user logs in.

Based upon the leaked records, it appears the breach occurred on October 14, 2020.

Cyble is disclosing the alleged data leak in the interest of the population impacted.

People who are concerned about their information exposure can register on Cyble’s data breach monitoring and notification platform, AmiBreached.com, to determine the risks at no cost.

The timeline of events:

  • Oct 14, 2020 – The alleged breach occurred (screenshot below)
  • Oct 30, 2020 – Cyble detected the breach
  • Oct 31, 2020 – Cyble validated the breach through validation of the leaked data with BigBasket users/information
  • Nov 1, 2020 – Cyble disclosed the breach to BigBasket management
  • Nov 7, 2020 – Public disclosure

Here are a couple of ways to prevent cyber-attacks:

  • Never click on unverified/unknown links
  • Do not open untrusted email attachments
  • Only download media from places you trust
  • Never use unfamiliar USBs
  • Use security software and keep it updated
  • Backup your data regularly
  • Keep passwords unique and unpredictable
  • Keep Software and Systems up to date
  • Train employees on Cyber Security
  • Set up Firewall for your internet
  • Take a Cyber Security assessment
  • Update passwords regularly

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Shopify Data Breach – Two Rogue Employees Stole Customer Data

Truecaller Data Breach – 47.5 Million Indian Truecaller Records On Sale in Dark Web

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...