Thursday, February 6, 2025
HomeCyber AttackTens of Millions of SMS text Messages & Massive Private Data Leaked...

Tens of Millions of SMS text Messages & Massive Private Data Leaked Online From Hacked Database

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a massive hacked database online that exposed tens of millions of SMS text messages, and private data belongs to a U.S company TrueDialog.

TrueDialog is an American communication company that offering SMS texting solutions to companies such as businesses, universities, and colleges in the USA.

Companies claim that they provide Enterprise-grade SMS Texting service, but this massive data leak indicates and leads to huge risks for their customers who have sent and received an SMS for a year of the period.

By holding an unsecured database, TrueDialog leaked millions of people’s sensitive data across the USA, and the researchers confirmed that the unprotected database belongs to TrueDialog by finding the evidence of their Host ID “api.truedialog.com”.

Discovered database, Also contains millions of account usernames and passwords, PII data of TrueDialog users and their customers, and much more.

Since the uncovered database huge volume of data, there is no doubt that the company compromising the privacy and security of 100 million US citizens across the country.

The Database with 604 GB of data and 1 billion entries that had sensitive data was initially discovered on 26/11/19, and it is hosted by Microsoft Azure and runs on the Oracle Marketing Cloud in the USA.

What Types of Data Stored in the Unprotected Database

Researchers claim that the database contains different entries related to many aspects of TrueDialog’s business model and its a rare one that the single database with this much huge volume of sensitive data.

The database contains millions of email addresses, usernames, cleartext passwords, and base64 encoded passwords which can be easily decrypted.

According to VPNMentor research “Tens of millions of entries from messages sent via TrueDialog and conversations hosted on the platform and the Messages including,

  • Full Names of recipients, TrueDialog account holders, & TrueDialog users
  • Content of messages
  • Email addresses
  • Phone numbers of recipients and users
  • Dates and times messages were sent
  • Status indicators on messages sent, like Reading receipts, replies, etc.
  • TrueDialog account details
TrueDialog
Username & Password
TrueDialog
SMS conversation

The researcher also found some of the technical logs that revealed important details as to how the database is structured and managed.

This massive leak could lead to potential risks for the customers, and if it reached the wrong hand, cybercriminals could perform various attacks such as Phishing and scams, Identity theft, and Fraud, Account Takeover and Blackmail the customers.

TrueDialog has been finally closed the database and the database now secured. you can also check the important network security principles to protect businesses from cyber attacks.

Also Read: Black Friday Deals: All Master Level Cyber Security Bundle Courses From “Ethical Hackers Academy” With 90 % Offer

Read More:

MixCloud Hacked – 20 Million+ Users Stolen Personal Records Selling in Dark Web for $4,000

Adobe Hacked – Hackers Exploit The Bug in Magento Marketplace & Gained Access To The Users Data

Massive Data Leak – 1.2 Billion People Personal & Social Information That Consist of 4TB Data Exposed Online

OnePlus Hacked – Customers’ Personal Information Accessed by Hackers

T-Mobile Hacked – Hackers Gained Access to Prepaid Customers Data

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Paragon Spyware Allegedly Ends Spyware Contract with Italy

Paragon Solutions, an Israeli cybersecurity firm, has reportedly ended its spyware contract with Italy.The...

Authorities Arrested Hacker Who Compromised 40+ Organizations

Spanish authorities have arrested a hacker believed to be responsible for cyberattacks targeting over...

OpenAI Data Breach – Threat Actor Allegedly Claims 20 Million Logins for Sale

OpenAI may have become the latest high-profile target of a significant data breach.A...

Lumma Stealer Attacking Windows Users In India With Fake Captcha Pages

Cybersecurity experts are raising alarms over a new wave of attacks targeting Windows users...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

OpenAI Data Breach – Threat Actor Allegedly Claims 20 Million Logins for Sale

OpenAI may have become the latest high-profile target of a significant data breach.A...

Lumma Stealer Attacking Windows Users In India With Fake Captcha Pages

Cybersecurity experts are raising alarms over a new wave of attacks targeting Windows users...

Beware of Lazarus LinkedIn Recruiting Scam Targeting Org’s to Deliver Malware

A new wave of cyberattacks orchestrated by the North Korea-linked Lazarus Group has been...