Saturday, March 8, 2025
HomeData BreachHostinger Hacked - Hackers Gained Access to the 14 Million Customers Internal...

Hostinger Hacked – Hackers Gained Access to the 14 Million Customers Internal Systems Data

Published on

SIEM as a Service

Follow Us on Google News

Hostinger announced a major data breach that affected nearly 14 million customers, and it reset all the client’s password as a precaution measures.

Hostinger is one of the leading web hosting services provider and Internet domain registrar that provide services over 29 million users in 178 countries

cybercriminals bypass the Hostinger’s internal networks, and gained unauthorized access to internal system API which allows attackers to access hashed passwords, and some of the other sensitive data.

Hostinger said that there is no financial data involved this security breach and the vulnerable systems access has been terminated.

Hackers Gained the Internal System Access

Hostinger received an alert on August 23rd, 2019 that indicates unauthorized third access to one of their servers which contains an authorization token.

The token has allowed access and escalates the privilege to system RESTful API Server, which is used to query the details about our clients and their accounts.

According to Hostinger press release report “The API database contains various sensitive customers data including Client usernames, emails, hashed passwords, first names and IP addresses and the database table contains the information about 14 million Hostinger users.”

There is no financial data such as credit/debit card data involved with this incident since the Hostinger using third-party payment providers for the payment process for its services.

After they learned this incident, Hostinger has been reset all the customer’s password and sent an email to all the customers to reset the password.

Other than this, there are no other partners websites, domains, hosted emails are affected.

The company started the investigation with security exports, internal/external investigators to analyze the incident to increase the security protocols and learn the motivation of this breach and apply the strong security measures to prevent from the future Cyber attacks.

Hostinger advised it’s customers that don’t use the same passwords on multiple service providers across the web and to generate strong unique passwords with Password Manager.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking New updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...