ZEE5 Hacked – Hackers Stolen Over 150GB of Live Data from Video on Demand Platform

Hackers breached systems of Indian video on demand giant ZEE5 and threatening to sell the data on the dark web markets.

A hacker goes by name “John Wick” claimed that they have breached the ZEE5 systems and stolen over 150GB of live data and the website source code.

ZEE5 Hacked

According to the Quickcyber report, the hacker who stole the data appears to be from the Korean hacking group and they plan to sell the data on hacker forums.

ZEE5 HackedZEE5 Hacked

Hackers shared proof of access ZEE5’s private code repositories to Kanishk Tagade of Quickcyber, based on the access proof the hack happened between the end of February or March.

Yesterday the hacker group shared another sample which indicates the hacked database of ZEE5 and it includes live code secret keys and credentials of the unsecured AWS.

The last record found to be created on 24th April 2020, which indicates the hackers have access to recently subscribed users and the database contains users from almost every state in India.

The database also contains user records related to PAYMENT_PLATFORM of ZEE5 users. The table name mentioned “AXINOM_SUBSCRIPTION_TABLE.”

Axinom CEO Ralph Wagner, told GBHackers on Security that we “do not manage Zee5 database nor do Axinom system use the mentioned MySQL database and we don’t operate or manage Zee5 data services.”

He also mentions that “we will investigate this case, and will release a statement as soon as our investigations are complete.”

The leaked data includes following information such as

  • Recent transaction data
  • Email addresses
  • Mobile phone numbers
  • Passwords

An email sent from the hacker to some Indian newspapers, and employees of ZEE5 states that they “will expose your database & code in public for open sale soon.”

The Email address used to send notifications is “hckindia[@]tutanota.com”, Tutanota is a secure and encrypted email service that denies tracing the email.

The same Email address is used in the ransom note of Dharma ransomware and the same email address is seen in some defaced websites claiming to be done by “Korean Hackers.”

This is not the first time, earlier this year credentials of 1,023 ZEE5 users Premium accounts were circulated on the web.

Zee5 not yet responded for the breach, we will update once we get further information regarding the breach.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for WordPress,…

14 minutes ago

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign embedded…

21 minutes ago

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through a…

28 minutes ago

Printer Company Distributes Malicious Drivers Infected with XRed Malware

Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious code,…

40 minutes ago

Chinese Agent Impersonate as Stanford Student For Intelligence Gathering

Chinese intelligence operative posing as a Stanford University student has been uncovered following an investigation…

52 minutes ago

Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key

Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical issues…

4 hours ago