infotechlead

FatakPay data leak exposes over 27 mn sensitive files

On September 16th, Cybernews discovered a significant misconfiguration in an Amazon AWS S3 bucket belonging to FatakPay, a Mumbai-based fintech company. The unsecured bucket, which lacked password protection, exposed over 27 million sensitive files, including the personal and financial data of loan applicants.

IT network security issues

Exposed Data:

Full names, home addresses, and contact information

National IDs, including PAN and Aadhaar numbers

Loan agreements, account statements, and filled applications

User selfies for verification

Credit score reports (CRIF and CIBIL)

The leaked Know Your Customer (KYC) documents and other details pose severe risks such as identity theft, financial fraud, phishing attacks, and physical threats like doxxing and harassment. Malicious actors could exploit this information to impersonate victims, take out loans, or gain unauthorized access to bank accounts.

Timeline:

Discovery: September 16th

Initial Disclosure: October 15th

Follow-ups: October 22nd – December 3rd

Secured: December 5th

FatakPay has not provided an official comment. The incident underscores the critical need for robust data security measures in financial institutions to protect users from the cascading consequences of data breaches.

Misconfigurations in Amazon AWS S3 buckets

Misconfigurations in Amazon AWS S3 buckets often occur due to a combination of human error, lack of technical expertise, and weak governance practices. One common cause is the inadvertent setting of public accessibility during bucket creation, often because users misunderstand the implications of permission settings. The complexity of AWS’s permission structures, including Identity and Access Management (IAM) policies, bucket policies, and access control lists, can also lead to errors where access is granted more broadly than intended.

Inadequate monitoring and poor security practices exacerbate these issues. For instance, failing to enable logging tools such as AWS CloudTrail or S3 Access Logs can make it difficult to detect unauthorized access or unintended exposure. Similarly, the absence of encryption for stored data adds another layer of vulnerability. Missteps can also arise when organizations rely on default settings or third-party tools, assuming they are secure, or during the integration of S3 with other systems, where configurations may be unintentionally overridden.

Governance issues, such as the lack of regular audits or automated security checks, allow misconfigurations to persist undetected. Rapid scaling, particularly in startups or small teams, often prioritizes speed over security, leading to oversight in configuring storage. As data volume grows, maintaining secure configurations becomes even more challenging without proper controls.

Preventing such misconfigurations requires a focus on training administrators, leveraging AWS security tools, implementing automated scans, conducting regular audits, and enforcing the principle of least privilege to restrict access. Addressing these challenges can significantly reduce the likelihood of sensitive data being exposed through misconfigured S3 buckets.

Rajani Baburajan

Latest

More like this
Related

Cybersecurity issues in Rockerbox.tech database exposure

Rockerbox.tech, a Texas-based tax credit consulting firm, has been...

Cybersecurity alert: Amazon Prime Day becomes main target for scams

As Amazon launches Prime Day 2025 on July 8,...

Massive surge in cookie theft sparks cybersecurity alarms worldwide

The global cybersecurity industry is under mounting pressure as...

Ingram Micro detects ransomware attack on internal systems

Ingram Micro recently detected a ransomware attack on parts...