Sunday, December 3, 2023

New Cryptocurrency Bezop (BEZ) Leaks More than 25,000 Investors Personal Information

Bezop (BEZ) is a decentralized peer to peer e-commerce order management and processing system powered by smart contracts, an autonomous buyer-seller protection service, and a simple vat collection systemall built on a decentralized blockchain network.

It offers an easy copy paste integration which allows merchants to sell their products and services and get paid in bezop. The DOM built with open source languages Open source languages such as HTML5, React JS, Node Js, and MongoDB.

Security researchers from Kromtech Security identified a public MongoDB Database that contains over 25,000 investors details of New Cryptocurrency Bezop (BEZ).
The exposed database contains full names, addresses, email addresses, encrypted passwords, wallet information, along with links to scanned passports, driver’s licenses, and other IDs.

At the time Bezop (BEZ) launched it runs a Bounty Programme to reward early adopters who spread the word about BEZOP and the people who promote Bezop Tokens on Facebook would earn Bezop Tokens.

Also Read Unprotected MongoDB database contains a 19 Million California state voters information

They left one of the table “Bounty” open “so it appears that the database left unprotected may contain the information for the people who invested and participated in this part of the program” says Kromtech Security.

Leaving the early investors data on the public is not a good site for the new startup “Given the changes to MongoDB, it would have to have been deliberately configured to be public, a configuration which should not even be risked internally” says Kromtech Security.

The publically available database details have been notified to Bezop by Kromtech Security and now the database secured by Bezop.

Website

Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles