Thursday, January 30, 2025
HomeAmazon AWS49 Million Instagram Influencers, Celebrities Personal Data Leaked Online

49 Million Instagram Influencers, Celebrities Personal Data Leaked Online

Published on

SIEM as a Service

Follow Us on Google News

A new massive database uncovered that contains nearly 49 million of Instagram Influencer’s, celebrities and brand account contact information leaked online.

Security researcher Anurag Sen discovered this unprotected database and reported to Tech Crunch, in result, owners have been notified and secured the database.

Further investigation reveals that the database owned by Mumbai-based social media marketing firm Chtrbox, a company paying to top accounts owners link influencers for sponsor content in their account.

This unprotected database hosted in Amazon web services doesn’t have any password protection which allows anyone can access the database online without any password.

Database contains tons of personal information which belongs to tens of millions of Instagram influencer’s including, their bio, profile picture, the number of followers they have, if they’re verified and their location by city and country, but also contained their private contact information, such as the Instagram account owner’s email address and phone number. Tech Crunch Revealed today.

” Each record in the database contained a record that calculated the worth of each account, based off the number of followers, engagement, reach, likes and shares they had. This was used as a metric to determine how much the company could pay an Instagram celebrity or influencer to post an ad.”

This incident happened 2 years after the massive Instagram data breach due to a security bug in its developer API which allowed hackers to gain access the email addresses and phone numbers of six million Instagram accounts.

“We’re looking into the issue to understand if the data described – including email and phone numbers – was from Instagram or from other sources,” said an updated statement. “We’re also inquiring with Chtrbox to understand where this data came from and how it became publicly available,” Facebook said in Tech Crunch Statement.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Instagram Hack – How Hacking Group Steals Popular Instagram Profiles

Facebook Stored Millions of Instagram Users Password in Plain Text

Instagram Critical Bug Leaked User’s Password Via its Data Download Tool

These Google Play Apps are Steal your Instagram Credential -Beware

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in...

Salt Typhoon Hacked Nine U.S. Telecoms, Tactics and Techniques Revealed

Salt Typhoon, a state-sponsored Advanced Persistent Threat (APT) group linked to the People's Republic...

BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data

A major cyber threat looms over Indian financial giant ICICI Bank as the notorious...