TechCrunch News 09月27日
印度银行转账文件泄露,涉及大量敏感客户信息
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

印度一家云服务器发生数据泄露事件,导致数十万份银行转账文件暴露,其中包含客户的账号、交易金额及联系方式。网络安全公司UpGuard的研究人员在8月底发现,一个公开的亚马逊存储服务器泄露了27.3万份印度客户银行转账的PDF文件。这些文件是用于通过印度国家自动清算处理系统(NACH)进行交易的,涉及至少38家银行和金融机构。尽管数据泄露最终得到封堵,但泄露源头仍未查明。事后,印度金融科技公司Nupay承认其配置失误导致了此次泄露。

🛡️ **大规模数据泄露事件**:印度一家云服务器发生严重数据泄露,导致约27.3万份包含敏感信息的银行转账文件暴露。这些文件包含了印度客户的账号、交易金额以及联系方式等个人信息,可能导致潜在的金融欺诈和身份盗窃风险。

🏦 **涉及广泛的金融机构**:泄露的数据与至少38家不同的银行和金融机构相关联,其中印度贷款机构Aye Finance和印度国家银行(State Bank of India)在样本文件中出现的频率较高。这表明此次泄露对印度金融体系可能产生了广泛影响。

🔍 **泄露源头追踪与确认**:网络安全公司UpGuard在发现数据泄露后,立即通知了相关机构,但泄露源头一度不明。最终,印度金融科技公司Nupay承认,由于其在亚马逊S3存储桶中的配置失误,导致了此次敏感数据的公开暴露。

⚠️ **安全漏洞与责任认定**:此次事件凸显了云存储配置不当可能带来的严重安全风险。尽管Nupay声称泄露的主要是测试数据且未发生未经授权的访问,但UpGuard对此表示质疑,并指出数据泄露的地址已被公开索引。此次泄露的具体时长和确切责任归属仍有待进一步澄清。

A data spill from an unsecured cloud server has exposed hundreds of thousands of sensitive bank transfer documents in India, revealing account numbers, transaction figures, and individuals’ contact details.

Researchers at cybersecurity firm UpGuard discovered in late August a publicly accessible Amazon-hosted storage server containing 273,000 PDF documents relating to bank transfers of Indian customers. 

The exposed files contained completed transaction forms intended for processing via the National Automated Clearing House, or NACH, a centralized system used by banks in India to facilitate high-volume recurring transactions, such as salaries, loan repayments, and utility payments.

The data was linked to at least 38 different banks and financial institutions, the researchers told TechCrunch.

The spilling data was eventually plugged, but the researchers said they could not identify the source of the leak.

Following the publication of this article, Indian fintech company Nupay reached out to TechCrunch by email to confirm that it “addressed a configuration gap in an Amazon S3 storage bucket” that contained the bank transfer forms.

It’s not clear why the data was left publicly exposed and accessible to the internet, though security lapses of this nature are not uncommon due to human error.

In its blog post detailing its findings, the UpGuard researchers said that out of a sample of 55,000 documents that they looked at, more than half of the files mentioned the name of Indian lender Aye Finance, which had filed for a $171 million IPO last year. The Indian state-owned State Bank of India was the next institution to appear by frequency in the sample documents, according to the researchers.

After discovering the exposed data, UpGuard’s researchers notified Aye Finance through its corporate, customer care, and grievance redressal email addresses. The researchers also alerted the National Payments Corporation of India, or NPCI, the government body responsible for managing NACH.

By early September, the researchers said the data was still exposed and that thousands of files were being added to the exposed server daily. 

UpGuard said it then alerted India’s computer emergency response team, CERT-In. The exposed data was secured shortly after, the researchers told TechCrunch.

Despite this, it remained unclear who was responsible for the security lapse. Spokespeople for Aye Finance and NCPI denied that they were the source of the data spill, and a spokesperson for the State Bank of India acknowledged our outreach but did not provide comment.

Following publication, Nupay confirmed that it was the cause of the data spill.

Nupay’s co-founder and chief operating officer, Neeraj Singh, told TechCrunch that a “limited set of test records with basic customer details” was stored in the Amazon S3 bucket and claimed “a majority were dummy or test files.”

The company said its Amazon-hosted logs “confirmed that there has been no unauthorized access, data leakage, misuse, or financial impact.”

UpGuard disputed Nupay’s claims, telling TechCrunch that only a few hundred of the thousands of files its researchers sampled appeared to contain test data or had Nupay’s name on the forms. UpGuard added that it was unclear how Nupay’s cloud logs can allegedly rule out any access to Nupay’s then-public Amazon S3 bucket, given that Nupay has not asked UpGuard for its IP addresses that were used to investigate the data exposure.

UpGuard also noted that details of the Amazon bucket were not limited to its researchers, as the address of the public Amazon S3 bucket had been indexed by Grayhatwarfare, a searchable database that indexes publicly visible cloud storage.

When asked by TechCrunch, Nupay’s Singh did not immediately say how long the Amazon S3 bucket was publicly accessible to the web.

First published on September 25 and updated with new information from Nupay.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

数据泄露 印度 银行转账 敏感信息 云安全 网络安全 Data Breach India Bank Transfers Sensitive Information Cloud Security Cybersecurity
相关文章