DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Creditseva hacked, personal and sensitive data accessed

Posted on January 5, 2018 by Dissent

CyberWarNews.info has the exclusive on this one:

Creditseva has been in the headlines before for the wrong reasons after security researcher Chris Vickery discovered that they had failed to secure a s3 instance which left tens of thousands personal details exposed.

Moving on months later and it has come to my attention that Creditseva has now come under attack by various hackers, one of which has managed to gain access to s3 buckets as well as rooting their server and defacing the website, not just once but twice.

[…]

The breach started just before the end of in November 2017 after a user on raid forums posted a small dump of information.

Another well known hacker using the twitter alias Taylor has managed to gain access to creditseva main website server and a copy of the s3 bucket credentials. The credentials allowed the hackers to gain access to the s3 buckets that have the same information that researcher chris vickery had discovered months back and to prove this Taylor has provided cyberwarnews.info some of the data from the s3 buckets.

Read more on CyberWarNews.info.  Given that this is a credit loan site (headquartered in India, with offices in Singapore), the hack of so much unsecured personal information is concerning.  After reviewing the data, Lee reported that

Each folder contains a .txt file that hold that individuals personal information include names, contacts, passports, addresses, financial and other loan related information. Some of the folders also contain a copy of that individuals passport and identification.

Lee attempted to notify the firm, who appeared to be already aware that they had a problem, but there has been no response to CWN from the firm as yet.

Category: Business SectorHackNon-U.S.

Post navigation

← PH: NPC wants private, public sectors to submit data security incident reports
Former Island Health nurse suspended over privacy breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • AMI Group – Travel & Tours notice of ransomware attack
  • Resource: Insider Threat reports
  • Za: Cyber extortionist sentenced to eight years in jail
  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.