Tuesday, September 10, 2024
HomeSecurity NewsNew Cryptocurrency Bezop (BEZ) Leaks More than 25,000 Investors Personal Information

New Cryptocurrency Bezop (BEZ) Leaks More than 25,000 Investors Personal Information

Published on

Bezop (BEZ) is a decentralized peer to peer e-commerce order management and processing system powered by smart contracts, an autonomous buyer-seller protection service, and a simple vat collection systemall built on a decentralized blockchain network.

It offers an easy copy paste integration which allows merchants to sell their products and services and get paid in bezop. The DOM built with open source languages Open source languages such as HTML5, React JS, Node Js, and MongoDB.

Security researchers from Kromtech Security identified a public MongoDB Database that contains over 25,000 investors details of New Cryptocurrency Bezop (BEZ).
The exposed database contains full names, addresses, email addresses, encrypted passwords, wallet information, along with links to scanned passports, driver’s licenses, and other IDs.

At the time Bezop (BEZ) launched it runs a Bounty Programme to reward early adopters who spread the word about BEZOP and the people who promote Bezop Tokens on Facebook would earn Bezop Tokens.

- Advertisement - EHA

Also Read Unprotected MongoDB database contains a 19 Million California state voters information

They left one of the table “Bounty” open “so it appears that the database left unprotected may contain the information for the people who invested and participated in this part of the program” says Kromtech Security.

Leaving the early investors data on the public is not a good site for the new startup “Given the changes to MongoDB, it would have to have been deliberately configured to be public, a configuration which should not even be risked internally” says Kromtech Security.

The publically available database details have been notified to Bezop by Kromtech Security and now the database secured by Bezop.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Chinese Hackers Using Open Source Tools To Launch Cyber Attacks

Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a...

Small Business, Big Threats: INE Security Launches Initiative to Train SMBs to Close a Critical Skills Gap

As cyber threats grow, small to medium-sized businesses (SMBs) are disproportionately targeted. According to...

Researchers Details Attacks On Air-Gaps Computers To Steal Data

The air-gap data protection method isolates local networks from the internet to mitigate cyber...

Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

In August 2024, researchers detected a malicious Google Chrome browser infection that led to...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...