Monday, March 17, 2025
HomeData BreachCleartrip Hacked - Attackers Selling Stolen Data on The Dark Web

Cleartrip Hacked – Attackers Selling Stolen Data on The Dark Web

Published on

SIEM as a Service

Follow Us on Google News

Cleartrip Hacked: An Indian travel company, ‘Cleartrip’ owned by Flipkart, and headquartered in Mumbai suffers a massive data breach. Reports say the attackers have gained access to Cleartrip’s internal systems.

The personal information of millions of users is being sold on the dark web. Cleartrip has confirmed this data breach and notified its customers via email.

“We have identified a security anomaly in a few of our internal systems. Our information security team is currently investigating the matter along with a leading external forensics partner and is taking the necessary action”.

“Appropriate legal action and recourse are being evaluated and steps are being taken as per the law”, says a Cleartrip spokesperson.

Cleartrip Data Breach

The reports say the files put on sale, include ones from June, therefore it is clear that the data was stolen in recent times.

“Hackers were selling the data on a private, invite-only forum on the dark web. However, the exact price at which the data was put on sale was not mentioned in the post”, the Security researcher Sunny Nehra.

 “It appeared that the hackers obtained all Cleartrip data. Apart from files seemingly having customer info, revenues, etc., there are also files including ‘GST on advance working’ which raise many questions about the involvement of some insider,” says Nehra.

It is said that the security researcher also reported the incident to India’s CERT-In. The company informed the users about the data breach not revealing anything specifically like what type of data was accessed by the threat actors.

Cleartrip promised the users through an email saying, “We would like to assure you that aside from some details which are a part of your profile, no sensitive information pertaining to your Cleartrip account has been compromised as a result of this anomaly of our systems”.

As a preventative measure, the company asked the users to ‘reset their account password’ and regret for the inconvenience caused.

The company added after informing customers about this data breach, it was taking appropriate legal action and recourse to ensure necessary steps are being taken as per the law.

Particularly, India has been witnessing a growing incidence of data breaches over the past couple of years. Based on the analysis, India ranked sixth among the countries with the highest number of data breaches. 18 out of every 100 Indians have been hit by data breaches since 2004.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kentico Xperience CMS Vulnerability Enables Remote Code Execution

In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light,...

Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution

A critical vulnerability, identified as CVE-2025-24016, has been discovered in the Wazuh Security Information...

Espressif Systems Flaws Allow Hackers to Execute Arbitrary Code

A series of vulnerabilities has been discovered in Espressif Systems' ESP32 devices, specifically affecting...

AI Operator Agents Helping Hackers Generate Malicious Code

Symantec's Threat Hunter Team has demonstrated how AI agents like OpenAI's Operator can now...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials

The HELLCAT ransomware group has claimed responsibility for a significant data breach at Jaguar...

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered...

Telecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Japanese telecom giant NTT Communications (NTT Com) has confirmed a data breach that compromised...