Sunday, December 29, 2024
HomeCyber AttackTens of Millions of SMS text Messages & Massive Private Data Leaked...

Tens of Millions of SMS text Messages & Massive Private Data Leaked Online From Hacked Database

Published on

SIEM as a Service

Researchers discovered a massive hacked database online that exposed tens of millions of SMS text messages, and private data belongs to a U.S company TrueDialog.

TrueDialog is an American communication company that offering SMS texting solutions to companies such as businesses, universities, and colleges in the USA.

Companies claim that they provide Enterprise-grade SMS Texting service, but this massive data leak indicates and leads to huge risks for their customers who have sent and received an SMS for a year of the period.

- Advertisement - SIEM as a Service

By holding an unsecured database, TrueDialog leaked millions of people’s sensitive data across the USA, and the researchers confirmed that the unprotected database belongs to TrueDialog by finding the evidence of their Host ID “api.truedialog.com”.

Discovered database, Also contains millions of account usernames and passwords, PII data of TrueDialog users and their customers, and much more.

Since the uncovered database huge volume of data, there is no doubt that the company compromising the privacy and security of 100 million US citizens across the country.

The Database with 604 GB of data and 1 billion entries that had sensitive data was initially discovered on 26/11/19, and it is hosted by Microsoft Azure and runs on the Oracle Marketing Cloud in the USA.

What Types of Data Stored in the Unprotected Database

Researchers claim that the database contains different entries related to many aspects of TrueDialog’s business model and its a rare one that the single database with this much huge volume of sensitive data.

The database contains millions of email addresses, usernames, cleartext passwords, and base64 encoded passwords which can be easily decrypted.

According to VPNMentor research “Tens of millions of entries from messages sent via TrueDialog and conversations hosted on the platform and the Messages including,

  • Full Names of recipients, TrueDialog account holders, & TrueDialog users
  • Content of messages
  • Email addresses
  • Phone numbers of recipients and users
  • Dates and times messages were sent
  • Status indicators on messages sent, like Reading receipts, replies, etc.
  • TrueDialog account details
TrueDialog
Username & Password
TrueDialog
SMS conversation

The researcher also found some of the technical logs that revealed important details as to how the database is structured and managed.

This massive leak could lead to potential risks for the customers, and if it reached the wrong hand, cybercriminals could perform various attacks such as Phishing and scams, Identity theft, and Fraud, Account Takeover and Blackmail the customers.

TrueDialog has been finally closed the database and the database now secured. you can also check the important network security principles to protect businesses from cyber attacks.

Also Read: Black Friday Deals: All Master Level Cyber Security Bundle Courses From “Ethical Hackers Academy” With 90 % Offer

Read More:

MixCloud Hacked – 20 Million+ Users Stolen Personal Records Selling in Dark Web for $4,000

Adobe Hacked – Hackers Exploit The Bug in Magento Marketplace & Gained Access To The Users Data

Massive Data Leak – 1.2 Billion People Personal & Social Information That Consist of 4TB Data Exposed Online

OnePlus Hacked – Customers’ Personal Information Accessed by Hackers

T-Mobile Hacked – Hackers Gained Access to Prepaid Customers Data

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...