Zomato Breach: Hacker Lists 17 Million User Emails and Passwords for Sale

Data Breach at Zomato Exposes Millions of User Accounts

In a significant cybersecurity incident, India’s leading online restaurant platform, Zomato, has reported a major data breach affecting approximately 17 million of its 120 million user accounts. The breach was confirmed through a blog post published by the company, which highlighted that unauthorized access to its database has resulted in the theft of sensitive user account information.

The compromised data primarily includes user email addresses and hashed passwords. Notably, Zomato has asserted that the passwords are stored in an encrypted format, claiming that they cannot be easily decrypted by the attackers. However, this assertion raises concerns among experts, particularly in light of modern hacking techniques and cloud computing advancements that can potentially compromise even robust encryption within hours.

Following the breach, a hacker known as “nclay” has surfaced on a known Dark Web marketplace, offering to sell the data of the 17 million affected accounts. The vendor provided sample data to verify the authenticity of the breach and is demanding payment in Bitcoin, thus heightening the urgency for Zomato users to take preventive actions.

Zomato maintains that the breach did not affect payment card information, which is stored in a separate, secure database compliant with PCI Data Security Standards. The firm has emphasized that no financial data has been compromised, although this claim does little to assuage user concerns over the security of their personal information.

Zomato believes the breach may be linked to internal vulnerabilities, suggesting that an employee’s development account might have been compromised. The company has initiated a thorough investigation and is implementing measures to fortify its security posture. It appears that the threat vector may involve tactics related to initial access and persistence, which are outlined in the MITRE ATT&CK framework. This framework provides insights into how adversaries typically maneuver within compromised environments, potentially employing social engineering techniques or exploiting internal access.

In light of this incident, Zomato users are strongly advised to change their passwords immediately, not only for their Zomato accounts but also for any other platforms using the same credentials. The recommendation to utilize password managers for generating and storing complex passwords has been reiterated, as good password hygiene can significantly bolster user security.

As the situation unfolds, business owners and cybersecurity professionals should remain vigilant and prepared for potential follow-up attacks that may be aimed at extracting further personal or financial details from users. Phishing attempts often follow breaches, posing additional risks to affected individuals.

This incident underscores the importance of robust cybersecurity measures and diligent user education to mitigate risks associated with data breaches in the digital landscape. As Zomato navigates this crisis, the incident serves as a cautionary tale for organizations about the continuous threat of cyber adversaries and the necessity for proactive defense strategies.

Source link