Monday, November 4, 2024
HomeCyber AttackZEE5 Hacked - Hackers Stolen Over 150GB of Live Data from Video...

ZEE5 Hacked – Hackers Stolen Over 150GB of Live Data from Video on Demand Platform

Published on

Malware protection

Hackers breached systems of Indian video on demand giant ZEE5 and threatening to sell the data on the dark web markets.

A hacker goes by name “John Wick” claimed that they have breached the ZEE5 systems and stolen over 150GB of live data and the website source code.

ZEE5 Hacked

According to the Quickcyber report, the hacker who stole the data appears to be from the Korean hacking group and they plan to sell the data on hacker forums.

- Advertisement - SIEM as a Service
ZEE5 Hacked

Hackers shared proof of access ZEE5’s private code repositories to Kanishk Tagade of Quickcyber, based on the access proof the hack happened between the end of February or March.

Yesterday the hacker group shared another sample which indicates the hacked database of ZEE5 and it includes live code secret keys and credentials of the unsecured AWS.

The last record found to be created on 24th April 2020, which indicates the hackers have access to recently subscribed users and the database contains users from almost every state in India.

The database also contains user records related to PAYMENT_PLATFORM of ZEE5 users. The table name mentioned “AXINOM_SUBSCRIPTION_TABLE.”

Axinom CEO Ralph Wagner, told GBHackers on Security that we “do not manage Zee5 database nor do Axinom system use the mentioned MySQL database and we don’t operate or manage Zee5 data services.”

He also mentions that “we will investigate this case, and will release a statement as soon as our investigations are complete.”

The leaked data includes following information such as

  • Recent transaction data
  • Email addresses
  • Mobile phone numbers
  • Passwords
ZEE5 Hacked

An email sent from the hacker to some Indian newspapers, and employees of ZEE5 states that they “will expose your database & code in public for open sale soon.”

The Email address used to send notifications is “hckindia[@]tutanota.com”, Tutanota is a secure and encrypted email service that denies tracing the email.

The same Email address is used in the ransom note of Dharma ransomware and the same email address is seen in some defaced websites claiming to be done by “Korean Hackers.”

This is not the first time, earlier this year credentials of 1,023 ZEE5 users Premium accounts were circulated on the web.

Zee5 not yet responded for the breach, we will update once we get further information regarding the breach.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Russia, Iran, And China Influence U.S. Elections, Microsoft Warns

The researchers have observed consistent efforts by Russia, Iran, and China to exert foreign...