Thursday, February 27, 2025
Homecyber securityHackers Claiming Dettol Data Breach: 453,646 users Impacted

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

Published on

SIEM as a Service

Follow Us on Google News

A significant data breach has been reported by a threat actor known as ‘Hana,’ who claims to have compromised the personal information of 453,646 users of Dettol India. The breach was announced via a post on the social media platform X by FalconFeedsio.

Details of the Breach

According to the post, the compromised data includes sensitive information such as user IDs, usernames, passwords, parents’ names, mobile numbers, addresses, states, and PIN codes.

The breach has raised serious concerns about the security protocols at Dettol India, a leading brand in health and hygiene products.

The data breach was allegedly executed through Dettol India’s website (http://dettol.co.in), exposing a vast amount of personal data to potential misuse.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

The revelation has prompted immediate action from cybersecurity experts and authorities. Users affected by the breach are advised to change their passwords and monitor their accounts for suspicious activity.

The potential for identity theft and other cybercrimes is high, given the nature of the data that has been compromised. Dettol India has yet to issue an official statement regarding the breach.

However, experts urge the company to conduct a thorough investigation and implement more robust security measures to prevent future incidents.

The incident has also sparked a broader conversation about the need for stronger data protection laws and practices in India. This breach is a stark reminder of the vulnerabilities in the digital age.

As companies increasingly rely on digital platforms to engage with customers, the importance of cybersecurity cannot be overstated.

The Dettol data breach is one of the latest in a series of cyberattacks targeting major corporations, highlighting the need for continuous vigilance and improvement in cybersecurity measures.

The incident serves as a wake-up call for companies and consumers to prioritize data security and remain informed about the potential risks associated with online interactions.

As investigations continue, the focus will be on mitigating the damage and ensuring that such breaches do not recur in the future.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...