Wednesday, April 2, 2025
HomeCyber Security NewsNearly 700,000 Plaintext Records of American Express India Customers Personal Info Exposed...

Nearly 700,000 Plaintext Records of American Express India Customers Personal Info Exposed Online

Published on

SIEM as a Service

Follow Us on Google News

An American Express branch in India exposed millions of customers data online form an unprotected Mongo DB, which allows anyone to access and edit the information.

The unprotected Mongo DB was discovered by Bob Diachenko from cybersecurity firm Hacken by using Shodan and BinaryEdge.

Diachenko found several collections of data contained readable links, access details for services and accounts hosted under the americanexpressindia.co.in domain.

The exposed database contains 689,272 unencrypted Records which includes Amex India customers’ phone numbers, names, email addresses, and ‘type of card’ description fields.

Most parts of the records in the database are encrypted, the encrypted data included 2,332,115 records which included names, addresses, Aadhar numbers (Indian government unique ID number), PAN card numbers and phone numbers.

“Upon closer examination, I am inclined to believe that the database was not managed by AmEx itself but instead by one their subcontractors who were responsible for SEO or lead generation”, Diachenko said.

Diachenko contacted American Express incident response team and the database was secured now from public access. Also, the team confirmed there is no unauthorized access to the environment where the data resides.

We applaud AmEx’s rapid response to this issue, noting they immediately took down that server upon notification and began further investigations, reads Hackerproof blog post.

Related Read

Radisson Hotel Group Data Breach Exposed Customer’s Personal Data

HSBC Bank Data Breach Exposed Account Numbers, Balances, Transaction History and Other Details

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has...

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...