ZEE5 Hacked – Hackers Stolen Over 150GB of Live Data from Video on Demand Platform

Hackers breached systems of Indian video on demand giant ZEE5 and threatening to sell the data on the dark web markets.

A hacker goes by name “John Wick” claimed that they have breached the ZEE5 systems and stolen over 150GB of live data and the website source code.

ZEE5 Hacked

According to the Quickcyber report, the hacker who stole the data appears to be from the Korean hacking group and they plan to sell the data on hacker forums.

Hackers shared proof of access ZEE5’s private code repositories to Kanishk Tagade of Quickcyber, based on the access proof the hack happened between the end of February or March.

Yesterday the hacker group shared another sample which indicates the hacked database of ZEE5 and it includes live code secret keys and credentials of the unsecured AWS.

The last record found to be created on 24th April 2020, which indicates the hackers have access to recently subscribed users and the database contains users from almost every state in India.

The database also contains user records related to PAYMENT_PLATFORM of ZEE5 users. The table name mentioned “AXINOM_SUBSCRIPTION_TABLE.”

Axinom CEO Ralph Wagner, told GBHackers on Security that we “do not manage Zee5 database nor do Axinom system use the mentioned MySQL database and we don’t operate or manage Zee5 data services.”

He also mentions that “we will investigate this case, and will release a statement as soon as our investigations are complete.”

The leaked data includes following information such as

  • Recent transaction data
  • Email addresses
  • Mobile phone numbers
  • Passwords

An email sent from the hacker to some Indian newspapers, and employees of ZEE5 states that they “will expose your database & code in public for open sale soon.”

The Email address used to send notifications is “hckindia[@]tutanota.com”, Tutanota is a secure and encrypted email service that denies tracing the email.

The same Email address is used in the ransom note of Dharma ransomware and the same email address is seen in some defaced websites claiming to be done by “Korean Hackers.”

This is not the first time, earlier this year credentials of 1,023 ZEE5 users Premium accounts were circulated on the web.

Zee5 not yet responded for the breach, we will update once we get further information regarding the breach.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

DCRat Malware Spreading via YouTube to Steal Login Credentials

Cybersecurity researchers have identified a renewed wave of attacks involving the Dark Crystal RAT (DCRat),…

12 minutes ago

Java Axios Package Vulnerability Threatens Millions of Servers with SSRF Exploit

A critical security issue has been identified in the Axios package for JavaScript, which poses…

15 minutes ago

Microsoft Patch Tuesday March 2025 – 6 Actively Exploited Zero-Days & 57 Vulnerabilities Are Fixed

Microsoft has rolled out its March 2025 Patch Tuesday update, addressing a total of 57…

31 minutes ago

PHP XXE Injection Vulnerability Allows Attackers to Access Config Files & Private Keys

A newly uncovered XML External Entity (XXE) injection vulnerability in PHP has demonstrated how attackers…

55 minutes ago

Hackers Exploit Advanced MFA Bypass Techniques to Compromise User Accounts

In recent years, phishing has remained the most prevalent form of cyberattack, with approximately 1.2%…

1 hour ago

Over 400 IPs Actively Exploiting Multiple SSRF Vulnerabilities in the Wild

A recent surge in Server-Side Request Forgery (SSRF) exploitation has been detected by GreyNoise, highlighting…

1 hour ago