Thursday, March 28, 2024

Nearly 700,000 Plaintext Records of American Express India Customers Personal Info Exposed Online

An American Express branch in India exposed millions of customers data online form an unprotected Mongo DB, which allows anyone to access and edit the information.

The unprotected Mongo DB was discovered by Bob Diachenko from cybersecurity firm Hacken by using Shodan and BinaryEdge.

Diachenko found several collections of data contained readable links, access details for services and accounts hosted under the americanexpressindia.co.in domain.

The exposed database contains 689,272 unencrypted Records which includes Amex India customers’ phone numbers, names, email addresses, and ‘type of card’ description fields.

Most parts of the records in the database are encrypted, the encrypted data included 2,332,115 records which included names, addresses, Aadhar numbers (Indian government unique ID number), PAN card numbers and phone numbers.

“Upon closer examination, I am inclined to believe that the database was not managed by AmEx itself but instead by one their subcontractors who were responsible for SEO or lead generation”, Diachenko said.

Diachenko contacted American Express incident response team and the database was secured now from public access. Also, the team confirmed there is no unauthorized access to the environment where the data resides.

We applaud AmEx’s rapid response to this issue, noting they immediately took down that server upon notification and began further investigations, reads Hackerproof blog post.

Related Read

Radisson Hotel Group Data Breach Exposed Customer’s Personal Data

HSBC Bank Data Breach Exposed Account Numbers, Balances, Transaction History and Other Details

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles