Friday , November 22 2024

Multinational bank leaks passports and credit card numbers

ICICI Bank leaked millions of records with sensitive data, including financial information and personal documents of the bank’s clients.

  • ICICI Bank, an Indian multinational valued at more than $76 billion, has more than 5,000 branches across India and is present in at least another 15 countries worldwide.
  • A misconfiguration of the bank systems exposed millions of records with sensitive data.
  • Among the leaked data were bank account details, bank statements, credit card numbers, full names, dates of birth, home addresses, phone numbers, emails, personal identification documents, and employees’ and candidates’ CVs.
  • Cybernews contacted ICICI Bank and CERT-IN, and the company fixed the issue.

In 2022, the ICICI Bank’s resources were named a “critical information infrastructure” by the Indian government – any harm to it can impact national security. However, despite the critical status of bank infrastructure on the national level, the security of crucial data was not ensured.

“Forces Penpals” exposed US and UK Military Social Network’s 1 Million Records

Renowned cybersecurity researcher Jeremiah Fowler uncovered a non-password-protected database having over 1.1 million records linked to Conduitor Limited (Forces Penpals)....
Read More
“Forces Penpals” exposed US and UK Military Social Network’s 1 Million Records

CVE-2024-51503
Trend Micro released updates for Deep Security Agent RCE

Trend Micro released a security update for Deep Security 20 Agent Manual Scan Command Injection RCE Vulnerability (CVE-2024-51503) that resolves...
Read More
CVE-2024-51503  Trend Micro released updates for Deep Security Agent RCE

Apple Releases Patch for two Actively Exploited Zero-Day

Apple released critical updates for its various products including for iOS, iPadOS, macOS, visionOS, and Safari to fix two zero-day...
Read More
Apple Releases Patch for two Actively Exploited Zero-Day

Maxar Space Data Leak, Company admit, Investigation ongoing!

Maxar Space Systems has verified a major data breach that exposed particular information of current and former workers. The breach...
Read More
Maxar Space Data Leak, Company admit, Investigation ongoing!

GitHub CLI Vulnerability Could Allow RCE

A security vulnerability (CVE-2024-52308) in the GitHub Command Line Interface (CLI) could allow remote code execution on users' devices. With...
Read More
GitHub CLI Vulnerability Could Allow RCE

“Sarcoma” ransomware group
Hacker to disclose “Popular Life Insurance” 36 GB of stolen data

“Sarcoma” ransomware group attacked a well known Bangladeshi insurance company named "Popular life insurance company ltd". The threat actor keeps...
Read More
“Sarcoma” ransomware group  Hacker to disclose “Popular Life Insurance” 36 GB of stolen data

BugHunt 2024: A Milestone Cyber security Competition held at Dhaka

Bug Hunt 2024, one of the largest cyber security competitions and conferences in Bangladesh, was successfully held at the ICT...
Read More
BugHunt 2024: A Milestone Cyber security Competition held at Dhaka

TP-Link DHCP Vulnerability Allow Attackers Takeover Routers Remotely

A serious security flaw has been found in some TP-Link routers, potentially enabling hackers to remotely access the affected devices.The...
Read More
TP-Link DHCP Vulnerability Allow Attackers Takeover Routers Remotely

WSJ reports
T-Mobile hacked in massive breach of telecom networks

The Wall Street Journal reported on Friday citing people familiar with the matter that T-Mobile’s network was among the systems...
Read More
WSJ reports  T-Mobile hacked in massive breach of telecom networks

Palo Alto Networks Confirms critical RCE zero-day actively exploited

"Palo Alto Networks has observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall...
Read More
Palo Alto Networks Confirms critical RCE zero-day actively exploited

During the recent investigation, the Cybernews research team discovered that the bank leaked the sensitive data due to the misconfiguration of their systems.

If malicious actors accessed the exposed data, the company could have faced devastating consequences and put their clients at risk, as financial services are the main target for cybercriminals.

Screenshot of leaked passport
Screenshot of leaked passport

Leaked personal data

On February 1, the Cybernews research team discovered a misconfigured and publicly accessible cloud storage – Digital Ocean bucket – with over 3.6 million files belonging to ICICI Bank. Files exposed sensitive data of the bank and its clients.

Among the leaked clients’ data, there were bank account details, credit card numbers, full names, dates of birth, home addresses, phone numbers, and emails.

Screenshot of leaked bank statement
Screenshot of leaked bank statement

The bucket also stored files that revealed clients’ passports, IDs, and Indian PANs – Indian taxpayer identification numbers. Bank statements and filled-in know-your-customer (KYC) forms were also leaked.

The leak affected the bank’s staff as well, as CVs of current employees and job candidates were observed in the storage.

Company’s response

Cybernews reached out both to the bank and Indian Computer Emergency Response Team (CERT-IN), and the issue was fixed.

Cybernews researchers assert that access to the Digital Ocean bucket belonging to ICICI Bank was fully restricted on March 30.

We’ve also attempted to obtain an official comment from the bank’s communication team.

“Thanks for your email. With regards to it, we do not know which incident you are referring to,” the email reads.

The company recommended contacting the Corporate Communications Team. Unfortunately, Cybernews journalist’s email was rejected, and, at the time of writing, we’ve received no official response from the bank.

ICICI Bank's response
ICICI Bank’s response

Threat to financial accounts

Finance and insurance are one of the most targeted industries by cybercriminals.

Last year, with a total share of 18% of all cyberattacks, it was the second most targeted industry, following manufacturing.

The numbers are not surprising, as financial companies hold a treasure trove of sensitive and valuable data and financial assets, making them attractive targets.

“The impact of the discovered ICICI leak is estimated to be severe, as the volume of personal data leakage is significant,” said Cybernews researchers. “Such sensitive information could undermine ICICI bank’s reputation and may uncover details of the bank’s internal processes as well as jeopardize the safety and security of its clients and employees and their data.”

Screenshot of leaked filled-in KYC form
Screenshot of leaked filled-in KYC form

According to researchers, threat actors could use leaked data to commit identity theft and fraud. “For example, cybercriminals could use the stolen credentials and personal data to open accounts in the names of individuals without them being aware. Employees, businesses, and individuals whose data were exposed could be at risk of spear phishing campaigns,” added researchers.

The banking sector is especially vulnerable to phishing attacks, as malicious actors often go after logins to online banking platforms, credit card credentials, and bank account numbers.

Malicious actors could use leaked data to construct a successful phishing attack to gain access to bank accounts, make transfers, and perpetrate credit-card fraud.

“Another risk is the data being sold on the dark web, and ICICI Bank risking to be a victim of ransomware attacks,” added the Cybernews team.

Keep clients informed

To prevent such data leaks, researchers advise always securing cloud storage buckets. The ICICI Bank should mitigate the risk and further damage by notifying its customers of the data leak.

ICICI Bank should provide guidance for customers on identifying and avoiding fraudulent emails, websites, and calls, and urge them to immediately report any suspicious activities to the bank.

Those affected should change their login details and create strong passwords, as attackers could easily guess weak ones due to the vast amount of personally identifiable information (PII) exposed.

Check Also

paloalto

Palo Alto Networks Confirms critical RCE zero-day actively exploited

“Palo Alto Networks has observed threat activity exploiting an unauthenticated remote command execution vulnerability against …

Leave a Reply

Your email address will not be published. Required fields are marked *