Friday, February 21, 2025
Homecyber securityTaxi App Vendor Data Leak: 300K Passengers Data Exposed

Taxi App Vendor Data Leak: 300K Passengers Data Exposed

Published on

SIEM as a Service

Follow Us on Google News

Around 300,000 taxi passengers’ personal information was left exposed on the internet, causing concern in the UK and Ireland.

Cybersecurity researcher Jeremiah Fowler discovered the breach involving Dublin-based taxi dispatch system provider iCabbi and subsequently reported it to vpnMentor.

Fowler stumbled upon a non-password-protected database containing a wealth of passengers’ personal information (PII), including names, phone numbers, and email addresses.

The breach impacted nearly 300,000 individuals whose records were exposed.

The database contained 22,745 records in .csv format, detailing contact information and user IDs of customers primarily located in the UK and Ireland.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

The Exposed Data

The breach exposed various email addresses from various providers and private domains. The breakdown of the exposed email addresses includes 117,231 Gmail accounts, 65,060 Hotmail, 17,588 Yahoo, 18,099 iCloud, 12,798 Outlook, and 7,484 Live, among others.

The list also featured email addresses from significant media outlets such as the BBC and government agencies, including the NIH and HM Treasury, highlighting the breach’s potential ramifications.

Data Leak Sample

Upon discovering the breach, Fowler swiftly sent a responsible disclosure notice to iCabbi.

The company reacted promptly, restricting public access to the database the following day.

However, it remains unclear how long the data was exposed or if unauthorized parties accessed the non-password-protected database before the breach was contained.

iCabbi, known for its dispatch and fleet management technology, aims to modernize and manage taxi services, positioning itself as a competitive alternative to ride-hailing companies.

With over one billion bookings registered across 15 countries, the company’s influence in the taxi operation industry is significant.

In 2023, the UK’s taxi operation industry alone was valued at an estimated £8.6 billion, underscoring the potential impact of such a data breach.

As the investigation into the breach continues, the focus will likely shift towards understanding how such a significant amount of sensitive data was left unprotected, and what steps can be taken to prevent similar incidents from happening in the future.

Both passengers and industry stakeholders should prioritize data security and safeguard against cyber threats, making this breach a call to action.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing...

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical...

Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks

A critical security flaw in Fluent Bit, a widely adopted log processing and metrics...

New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands

The cybercriminal group behind the notorious "darcula-suite" platform has unveiled its latest iteration, darcula...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing...

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical...

Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks

A critical security flaw in Fluent Bit, a widely adopted log processing and metrics...