DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

A 2020 Data Breach That Continues To Remain An Unsolved Mystery

Posted on August 1, 2022 by Dissent

Over 3.4 million users’ data is up for sale in what was alleged to be a data breach at Paytm Mall. But now we don’t know whose data is it

By Sarvesh Mathi

In 2020, a cybersecurity firm alleged a massive data breach at Paytm Mall, but this was firmly denied by the company back then. Fast forward two years to July 26 2022 and Firefox began notifying affected users that the breach has been verified based on data provided by Have I Been Pwned, a website that allows people to check whether their personal data has been compromised by data breaches. Paytm once again doggedly denied any breach. A few days later, on July 29, Have I Been Pwned walked back on its claims and marked the data leak as “fabricated,” meaning the data did not come from Paytm.

The case continues to remain interesting because there is a database of leaked data out there with sensitive personal information of over 3 million people. Where did this data come from and why was there a strong correlation to the data submitted by Paytm Mall customers remains a mystery.

A Timeline of Events

August 2022: Cyble reports Paytm Mall data breach, Paytm denies

On, August 30 2022, an Atlanta-based cybersecurity firm, alleged that a known cybercrime group called “John Wick” used a backdoor in the Paytm Mall website and application to gain unrestricted access to the company’s entire database. The company alleged that this “potentially affects all accounts and related information at Paytm mall”. Cyble got this information from a former member of the group “John Wick” and this member reportedly claimed that this hack was made possible by an insider in Paytm Mall. As per Cyble, “John Wick” demanded 10 ether (ETH), equivalent to US$4,000 at the time, as a ransom for the data.

Paytm Mall denied that its databases were breached and called Cyble’s report about the hack and subsequent ransom “absolutely false”.

“We would like to assure that all user, as well as company data, is completely safe and secure. We have noted and investigated the claims of a possible hack and data breach, and these are absolutely false. We invest heavily in our data security, as you would expect. We also have a Bug Bounty program, under which we reward responsible disclosure of any security risks. We extensively work with the security research community and safely resolve security anomalies.” — Paytm Mall spokesperson

September 2022: Paytm sends cease and desist notice 

On September 4, Paytm sent a cease and desist notice to Cyble for publishing a false, “defamatory” and “slander[ous]” report. It further claimed that this piece of “disinformation” has “completely disrupted and terrified” its customers. Paytm asked Cyble to remove the report, publish an apology and notice that the previous report was false, not publish any “defamatory” posts about Paytm, and give Paytm a written undertaking that Cyble will not “indulge” in such activities in future. As of today, the Cyble report is not accessible.

July 26 2022: Firefox starts notifying affected users after Have I Been Pwned confirmed breach

Mozilla Firefox Monitor verified and added the breach to its database on July 26, 2022, and began notifying affected customers shortly thereafter.

 

Firefox noted that the breach was verified by Have I Been Pwned and the following data of nearly 3.4 million users was compromised:

  • Phone numbers
  • Email addresses
  • Dates of birth
  • Genders
  • Geographic locations
  • Income levels
  • Names
  • Purchases

Troy Hunt, the creator of Have I Been Pwned, explained on Twitter that his website confirmed the breach by contacting affected customers who validated the accuracy of the data.

 

 

 

As for why it took over two years to notify users of the reach, Firefox explained that “it can sometimes take months or years for credentials exposed in a data breach to appear on the dark web. Breaches get added to our database as soon as they have been discovered and verified.”

July 27, 2022: Paytm denies breach once again

As the affected customers brought up the issue on Twitter, Paytm Mall denied the breach, noting:

 

July 29, 2022: Have I Been Pwned marks the breach as “fabricated”

“Further investigation into the data concluded that the breach was fabricated and did not originate from Paytm,” Have I Been Pwned noted on its website on July 29. Troy Hunt explained that Paytm’s infosec team reached out to him and they had a chat about the authenticity of the data, after which they “collectively believe it’s fabricated” for the following reasons:

 

  1. “Firstly, verifying a breach is about confidence; some factors increase it, others decrease it, and eventually I have to make a call on whether it’s legit or not. Finding  @haveibeenpwned subscribers who confirm they used the service and the data is really theirs is part of that. In the @paytm case, there are also file names, CSV headers and other signals that *increase* confidence, but are also indicators that could be fabricated,” Hunt tweeted.
  2. Secondly, Paytm contended that there is a lot of data in the dump that they don’t collect. For example, Paytm noted that they don’t ask for “income declaration” or “account type” as there is no use case across Paytm to collect such information.
  3. Lastly, Hunt noted that there are over 72,000 email addresses beginning with “info@” in the database. Paytm cross-checked these addresses and said that they don’t have any of those addresses in its databases.

Where did the data come from?

While Hunt said that the data did not come from Paytm, he noted that the data itself is accurate.

 

Hunt further remarked that “this becomes just another set of data floating around being exchanged between an untold number of people. It’s not ‘dark web’ stuff either, it’s out there on public forums, just with a misattributed source.”

Some users on Twitter have pointed out that the data could have come from a stock trading platform given the type of data that has been leaked:

 

What about the correlation of data with Paytm’s database?

As for the reason why some Paytm users were able to verify the data as theirs, Hunt tweeted:

 

Paytm further submitted that the common users between the leaked data and its users amount to less than 5%. “I obviously have to take them at their word on the internal observations they’ve made, but they ran all the checks I asked for and based on the answers, I’ve now flagged this as ‘fabricated,’” Hunt tweeted.

Separately, Paytm suffered from a data breach back in 2017. Some of the overlapping data could have been obtained from that breach.


This post is released under a CC-BY-SA 4.0 license. It first originally appeared on Medianama.

 

Category: Business SectorCommentaries and Analyses

Post navigation

← Members of GnosticPlayers arrested and charged as members of ShinyHunters? (with Update1)
Brisbane man arrested for distributing spyware to thousands of cyber criminals since age 15 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.