Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Cybercriminals combine voice phishing and OTP grabbers to steal more data: Report

    September 25, 2023

    UK bolts US ‘data bridge’ deal onto EU-US Data Privacy Framework

    September 22, 2023

    Microsoft Employee Accidentally Exposes 38 Terabytes of Private Data: Report

    September 21, 2023
    Facebook Twitter Instagram
    Your Infotech
    • Data

      Cybercriminals combine voice phishing and OTP grabbers to steal more data: Report

      September 25, 2023

      UK bolts US ‘data bridge’ deal onto EU-US Data Privacy Framework

      September 22, 2023

      Microsoft Employee Accidentally Exposes 38 Terabytes of Private Data: Report

      September 21, 2023

      Sea of data or data you can see?

      September 15, 2023

      Chandrayaan missions providing unmatched data for global scientific community: Scientist Debiprosad Duari

      September 13, 2023
    • Cloud

      The risks of low-code and no-code development in cloud architecture

      September 20, 2023

      37 Signals says cloud repatriation plan has already saved it $1 million

      September 19, 2023

      Can multi-cloud lead to ‘multi’ loopholes in business enterprises?

      September 11, 2023

      Cloud first is dead—cloud smart is what’s happening now

      September 8, 2023

      How Do Health Tech and FinTech Benefit from Cloud Computing?

      September 5, 2023
    • Networking

      Enterprise DPU advances are spurred by AI, security, networking apps

      September 12, 2023

      Juniper Networks And Its Beyond Labs Vision

      September 1, 2023

      HPE Aruba Networking Product Vulnerabilities Allow File Overwrite

      August 18, 2023

      Extreme Networks is coming for Cisco, HPE market share

      August 9, 2023

      Flight to cloud drives IaaS networking adoption

      August 2, 2023
    • Virtualization

      Virtual Machines: An Introduction to the Different Types of Virtualization

      June 26, 2023

      Imagination and Telechips drive automotive display diversity with hardware virtualization

      March 16, 2023

      Device virtualization is key to IoT adoption

      March 3, 2023

      Discover how virtualization can transform your business with this online training

      February 7, 2023

      Server Virtualization Software Market Next Big Thing | Major Giants IBM, Oracle, Microsoft

      February 2, 2023
    • IT Infrastructure

      Unravelling the insecurity in our IT infrastructure

      July 26, 2023

      Networking for Practical
      Quantum Applications

      June 5, 2023

      TCS+ | The need for speed: Braintree’s Heath Huxtable on modern IT infrastructure

      March 13, 2023

      The race to net zero: Six ways to slash IT infrastructure emissions

      March 10, 2023

      Vertiv and TechAccess partner to boost African IT infrastructure solutions

      February 28, 2023
    Your Infotech
    Home»Data»Swachh City platform hacked, data of 16 million users leaked
    Data

    Swachh City platform hacked, data of 16 million users leaked

    yourinfotechBy yourinfotechSeptember 28, 2022Updated:November 10, 2022No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A threat actor called LeakBase shared a database containing Personal Identifiable Information (PII) such as email addresses, hashed passwords, User ID etc, belonging 16 million users of the Swachh City platform — swachh.city, an initiative of the Swachh Bharat Mission in association with the Ministry of Housing and Urban Affairs.

    The data, which is 1.25 gigabytes in size, was leaked on a popular file-hosting platform and was discovered by CloudSEK’s Threat Intelligence Team.

    The hacker usually goes by monikers such as LeakBase, Chucky, Chuckies, and Sqlrip on underground forums. It is understood that LeakBase often operates for financial gain and conducts sales on its marketplace forum leakbase.cc

    Also Read: Expert highlights importance of digital hygiene in an increasingly risk-prone online world

    Analysis of the Data

    From the data sample that was disclosed by the threat actor to substantiate his claim, researchers were able to assess the following information:

    Registered Email AddressesPassword HashesRegistered Phone NumberTransmitted OTP InformationLogin IP — to platformMAC Address from user’s systemsIndividual user tokensBrowser Fingerprint information

    CloudSEK’s researchers understand that if this information falls into the wrong hands, threat actors can glean and harvest more PII information from affected individuals.

    LeakBase also offers access to admin panels and servers of most CMS (Content Management Systems). These accesses are gained through unauthorized means and are sold for monetary profit.

    Also Read: These preventive measures can help you stay safe in the digital world

    What does this mean for affected individuals?

    As personal details such as phone numbers and email addresses are advertised for sale, there is a strong possibility of it being used against the users which the data belongs so.

    “This data can be leveraged by other threat actors to conduct large-scale cyber attacks such as phishing, smishing, social engineering, and even identity theft. We recommend that users affected by this leak check for unusual activity on their Swachh.city accounts and other banking and email accounts as well. As a precaution, they should also change their passwords and enable multi-factor authentication,” suggests Rahul Sasi, Co-founder and CEO, CloudSEK.

    It would equip malicious actors with details required to launch sophisticated ransomware attacks, exfiltrate data, and maintain persistence. This information can be aggregated to further be sold as leads on cybercrime forums. Social Engineering & Phishing attempts against affected entities or individuals.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous Article‘India is key to Ontario Teachers’ Pension Plan Board’s Asia story, easy to do business in’
    Next Article How to Set Up a 4G LTE Wi-Fi Network as an Alternative to Broadband
    yourinfotech
    • Website

    Related Posts

    Cybercriminals combine voice phishing and OTP grabbers to steal more data: Report

    September 25, 2023

    UK bolts US ‘data bridge’ deal onto EU-US Data Privacy Framework

    September 22, 2023

    Microsoft Employee Accidentally Exposes 38 Terabytes of Private Data: Report

    September 21, 2023

    Sea of data or data you can see?

    September 15, 2023

    Leave A Reply Cancel Reply

    Our Picks

    Subscribe to Updates

    Get the latest creative news from Your Infotech about Information Technology.

    About Us
    About Us

    We provide a wide range of customized, integrated B2B and B2C digital marketing services solutions that are ideal for your business.

    We're accepting new partnerships right now.

    Email Us: info@yourmartech.com
    Contact: +1-530-518-1420

    Our Brands
    • Your Martech
    • Your HR Tech
    • Your Fin Tech
    • Your Revenue
    • Your Bio Tech
    • Your POS Tech
    • Your Health Tech
    SUBSCRIBE NOW
    Loading
    LinkedIn
    • Privacy Policy
    © 2023 Vigarbiz Inc. Designed by Vigarbiz Media.

    Type above and press Enter to search. Press Esc to cancel.