Tuesday, May 28, 2024

Over 20 Million BigBasket Customers Data Exposed in DarkWeb

BigBasket(Innovative Retail Concepts Private Limited) is India’s largest online food and grocery store. It is funded by Alibaba Group, Mirae Asset-Naver Asia Growth Fund, and therefore the UK government-owned CDC group.

“Recently BigBasket became victim to a data breach,” reported Cyble. Cyble has indexed the breached information at AmiBreached.com.

The Cybel Research team found the database of Big Basket for sale in a cyber-crime market during routine Dark web monitoring, being sold for over $40,000.

The leak contains a database portion; with the table name ‘member_member’. The size of the SQL file is ~ 15 GB, containing near to 20 Million user data, and is being sold for around Rs 30 lakh.

The database consists of names, email IDs, password hashes (potentially hashed OTPs), contact numbers (mobile and phone), addresses, date of birth, location, and IP addresses of login among many others. While Cyble has mentioned “passwords”, the corporate uses a one-time password sent through SMS which keeps on changing every time a user logs in.

Based upon the leaked records, it appears the breach occurred on October 14, 2020.

Cyble is disclosing the alleged data leak in the interest of the population impacted.

People who are concerned about their information exposure can register on Cyble’s data breach monitoring and notification platform, AmiBreached.com, to determine the risks at no cost.

The timeline of events:

  • Oct 14, 2020 – The alleged breach occurred (screenshot below)
  • Oct 30, 2020 – Cyble detected the breach
  • Oct 31, 2020 – Cyble validated the breach through validation of the leaked data with BigBasket users/information
  • Nov 1, 2020 – Cyble disclosed the breach to BigBasket management
  • Nov 7, 2020 – Public disclosure

Here are a couple of ways to prevent cyber-attacks:

  • Never click on unverified/unknown links
  • Do not open untrusted email attachments
  • Only download media from places you trust
  • Never use unfamiliar USBs
  • Use security software and keep it updated
  • Backup your data regularly
  • Keep passwords unique and unpredictable
  • Keep Software and Systems up to date
  • Train employees on Cyber Security
  • Set up Firewall for your internet
  • Take a Cyber Security assessment
  • Update passwords regularly

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Shopify Data Breach – Two Rogue Employees Stole Customer Data

Truecaller Data Breach – 47.5 Million Indian Truecaller Records On Sale in Dark Web

Website

Latest articles

Researchers Exploited Nexus Repository Using Directory Traversal Vulnerability

Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes.The...

DDNS Service In Fortinet Or QNAP Embedded Devices Exposes Sensitive Data, Researchers Warn

Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting...

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles