Friday, February 7, 2025
HomeCyber AttackZEE5 Hacked - Hackers Stolen Over 150GB of Live Data from Video...

ZEE5 Hacked – Hackers Stolen Over 150GB of Live Data from Video on Demand Platform

Published on

SIEM as a Service

Follow Us on Google News

Hackers breached systems of Indian video on demand giant ZEE5 and threatening to sell the data on the dark web markets.

A hacker goes by name “John Wick” claimed that they have breached the ZEE5 systems and stolen over 150GB of live data and the website source code.

ZEE5 Hacked

According to the Quickcyber report, the hacker who stole the data appears to be from the Korean hacking group and they plan to sell the data on hacker forums.

ZEE5 Hacked

Hackers shared proof of access ZEE5’s private code repositories to Kanishk Tagade of Quickcyber, based on the access proof the hack happened between the end of February or March.

Yesterday the hacker group shared another sample which indicates the hacked database of ZEE5 and it includes live code secret keys and credentials of the unsecured AWS.

The last record found to be created on 24th April 2020, which indicates the hackers have access to recently subscribed users and the database contains users from almost every state in India.

The database also contains user records related to PAYMENT_PLATFORM of ZEE5 users. The table name mentioned “AXINOM_SUBSCRIPTION_TABLE.”

Axinom CEO Ralph Wagner, told GBHackers on Security that we “do not manage Zee5 database nor do Axinom system use the mentioned MySQL database and we don’t operate or manage Zee5 data services.”

He also mentions that “we will investigate this case, and will release a statement as soon as our investigations are complete.”

The leaked data includes following information such as

  • Recent transaction data
  • Email addresses
  • Mobile phone numbers
  • Passwords
ZEE5 Hacked

An email sent from the hacker to some Indian newspapers, and employees of ZEE5 states that they “will expose your database & code in public for open sale soon.”

The Email address used to send notifications is “hckindia[@]tutanota.com”, Tutanota is a secure and encrypted email service that denies tracing the email.

The same Email address is used in the ransom note of Dharma ransomware and the same email address is seen in some defaced websites claiming to be done by “Korean Hackers.”

This is not the first time, earlier this year credentials of 1,023 ZEE5 users Premium accounts were circulated on the web.

Zee5 not yet responded for the breach, we will update once we get further information regarding the breach.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Former Google Engineer Charged for Allegedly Stealing AI Secrets for China

A federal grand jury has indicted Linwei Ding, also known as Leon Ding, a...

Dell Update Manager Plugin Flaw Exposes Sensitive Data

Dell Technologies has issued a security advisory (DSA-2025-047) to address a vulnerability in the Dell Update...

DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption

DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app...

Critical Flaws in HPE Aruba ClearPass Expose Systems to Arbitrary Code Execution

Hewlett Packard Enterprise (HPE) has issued a high-priority security bulletin addressing multiple vulnerabilities in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

OpenAI Data Breach – Threat Actor Allegedly Claims 20 Million Logins for Sale

Threat actors from dark web forums claim to have stolen and leaked 20 million...

New Banking Attacking Users of Indian banks to Steal Aadhar, PAN, ATM & Credit Card PINs

A sophisticated malware campaign, dubbed "FatBoyPanel," has been uncovered by cybersecurity researchers, targeting users...

New Attack Method Bypasses EDR with Low Privileged Access

A new endpoint detection and response (EDR) evasion technique has been identified that allows...