DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

EXCLUSIVE: Creditmate.in developer’s goof left 19,000 consumers’ credit reports unsecured

Posted on August 2, 2018 by Dissent
By Dissent Doe and Lee Johnstone

On July 27, an independent researcher known as “Flash Gordon” (@s7sins on Twitter) contacted DataBreaches.net and Lee Johnstone to report that during a routine keyword search on Google, he had found numerous credit reports from Indian consumers exposed.

Identifying the owner of the database was not easy in this case, but Lee ultimately determined that CreditMate.in was the likely owner of the database.

CreditMate is the website operated by Urja Money Private Limited,  a financial technology company that provides services to various banking and financial services companies and non-banking financial companies such as Optimus Finance Limited. Urja Money provides these services to Optimus Financial Ltd through CreditMate.  For its part, CreditMate.in offers to help consumers get loans to purchase motorbikes (“two-wheeled bikes”) or used cars.

CreditMate accesses the TransUnion CIBIL credit reporting database to obtain reports on potential customers for its customers like Optimus Financial Ltd.  To be clear:  the database was not TransUnion’s database. Nor was the IP address TransUnion CIBIL’s IP address. The IP address and database were CreditMate’s.

The exposed files contained 4,717 reports of connecting to CIBIL credit reporting service, and 18,913 JSON reports with 7277 email addresses. The credit reports were from 2016 – the present.

Because the entities involved have acknowledged and confirmed the situation and because we do not want to reveal any internal structures that could be misused by criminals, we will not be posting any redacted screenshots of the exposed files. But similar to credit reports in the U.S., CIBIL reports contain a wealth of personal and financial information, and the exposed reports contained data fields such as:

  • member reference number
  • enquiry number
  • enquiry purpose
  • amount of loan being sought
  • full name
  • date of birth
  • gender
  • income tax ID number (PAN)
  • passport number
  • driver’s license number
  • universal ID number
  • 
telephone number
  • 
email address
  • employment information
  • employment income
  • CIBIL 
credit score
  • residential address
  • office address
  • payment history of other loans/credit cards

On July 29, DataBreaches.net sent email notification to CreditMate.in executives, with copies to Optimus Financial Ltd and TransUnion CBIL executives.

In response to the notification, we received a detailed and appreciative statement from Jonathan Bill, CEO for CreditMate, who reported that within hours of receiving our email, they had secured the data and started investigating what had happened. They found, in part, that:

  • At no point was there any direct access to TransUnion CIBIL systems or databases, a point which was confirmed by TransUnion CIBIL’s Chief Operating Officer.
  • CreditMate secures data and access to it by IP whitelisting and key management. The IP in question was an internal IP used for storing responses that we received from the credit bureau.
  • During testing and development of new features, one of their developers left the site open after briefly moving it outside of whitelisted area. The error went undetected until DataBreaches.net notified them.
  • A review of their logs indicated that apart from researchers’ access, “no external compromise was made and any of Google’s crawled data has been deleted.”

CreditMate will be following up by implementing additional automated security measures and will appoint an external agency to conduct a full data security audit, Bill informs DataBreaches.net. They will also be proactively notifying customers, even though they have no reason to believe that data has been compromised.

We also received a statement from TransUnion CIBIL’s Chief Operating Officer, who after noting that it wasn’t their system or database where the problem occurred, informed us that they estimated that 12,500 records were exposed, a number that does not match our research.

Of note,  their COO writes:

In order to protect consumers, pending outcome of the investigation, TransUnion CIBIL has suspended Optimus’ access. We take the protection of consumer and customer information extremely seriously and will work closely with Optimus / CreditMate on their investigations and will take all steps necessary to protect consumers.

As of the time of this publication, no statement was received from Optimus Financial Ltd.


Related:

  • Revealed: Afghan data breach after MoD official left laptop open on train
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • China Amends Cybersecurity Law and Incident Reporting Regime to Address AI and Infrastructure Risks
Category: Breach IncidentsBusiness SectorExposureNon-U.S.

Post navigation

← Forum post claims breach of 850k users’ information; leak from recruitmilitary.com?
Was LabMD Hacked? A Key Issue in Lawsuit Against FTC Lawyers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.