Saturday, September 7, 2024
HomeCyber Security NewsOver 20 Million BigBasket Customers Data Exposed in DarkWeb

Over 20 Million BigBasket Customers Data Exposed in DarkWeb

Published on

BigBasket(Innovative Retail Concepts Private Limited) is India’s largest online food and grocery store. It is funded by Alibaba Group, Mirae Asset-Naver Asia Growth Fund, and therefore the UK government-owned CDC group.

“Recently BigBasket became victim to a data breach,” reported Cyble. Cyble has indexed the breached information at AmiBreached.com.

The Cybel Research team found the database of Big Basket for sale in a cyber-crime market during routine Dark web monitoring, being sold for over $40,000.

- Advertisement - EHA

The leak contains a database portion; with the table name ‘member_member’. The size of the SQL file is ~ 15 GB, containing near to 20 Million user data, and is being sold for around Rs 30 lakh.

The database consists of names, email IDs, password hashes (potentially hashed OTPs), contact numbers (mobile and phone), addresses, date of birth, location, and IP addresses of login among many others. While Cyble has mentioned “passwords”, the corporate uses a one-time password sent through SMS which keeps on changing every time a user logs in.

Based upon the leaked records, it appears the breach occurred on October 14, 2020.

Cyble is disclosing the alleged data leak in the interest of the population impacted.

People who are concerned about their information exposure can register on Cyble’s data breach monitoring and notification platform, AmiBreached.com, to determine the risks at no cost.

The timeline of events:

  • Oct 14, 2020 – The alleged breach occurred (screenshot below)
  • Oct 30, 2020 – Cyble detected the breach
  • Oct 31, 2020 – Cyble validated the breach through validation of the leaked data with BigBasket users/information
  • Nov 1, 2020 – Cyble disclosed the breach to BigBasket management
  • Nov 7, 2020 – Public disclosure

Here are a couple of ways to prevent cyber-attacks:

  • Never click on unverified/unknown links
  • Do not open untrusted email attachments
  • Only download media from places you trust
  • Never use unfamiliar USBs
  • Use security software and keep it updated
  • Backup your data regularly
  • Keep passwords unique and unpredictable
  • Keep Software and Systems up to date
  • Train employees on Cyber Security
  • Set up Firewall for your internet
  • Take a Cyber Security assessment
  • Update passwords regularly

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Shopify Data Breach – Two Rogue Employees Stole Customer Data

Truecaller Data Breach – 47.5 Million Indian Truecaller Records On Sale in Dark Web

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...