Data of 25 lakh Airtel customers in Jammu and Kashmir allegedly leaked; telco claims no breach in server – Latest News

0
37
Data of 25 lakh Airtel customers in Jammu and Kashmir allegedly leaked; telco claims no breach in server - Latest News


New Delhi: Data of around 25 lakh Bharti Airtel subscribers of Jammu and Kashmir circle, including Aadhaar numbers, address and date of birth, has reportedly been leaked by hackers, even as the telecom operator denied any breach in its servers. A sample of the leaked database was shared on Twitter by cybersecurity researcher Rajshekhar Rajaharia which shows masked details of the subscribers.

Rajaharia also shared a video of an email conversation between Bharti Airtel and the hackers with the name of ‘Red Rabbit Team’.

The video shows that the hackers informed Bharti Airtel about the breach in December and demanded money.

“Hackers have claimed that they have access to pan-India data of Airtel subscribers and they only uploaded a sample of subscribers data from Jammu and Kashmir.

“It may be possible that the hacker may have uploaded a shell (malicious software code) in Airtel servers. During the Covid-19 peak period several companies could not focus on security and their data was breached,” Rajaharia said.

The hackers also uploaded the subscriber data on a website, but it was not accessible later.

When contacted, a Bharti Airtel spokesperson denied any breach of the company’s servers.

“Airtel takes great pride in deploying various measures to safeguard the privacy of its customers. In this specific case, we confirm that there is no data breach at our end.

“In fact, the claims made by this group reveal glaring inaccuracies and a large proportion of the data records do not even belong to Airtel. We have already apprised the relevant authorities of the matter,” the spokesperson said.

var secname=””;
var agename=””;
secname=’Tech News’;
agename=”;
var _sf_async_config=uid:10538,domain:”gadgetsnow.com”;
_sf_async_config.sections = secname;
_sf_async_config.authors = agename;
_sf_async_config.useCanonical = true;

//– BEGIN Chartbeat CODE —
if(typeof TimesGDPR != ‘undefined’ && typeof TimesGDPR.common.consentModule.gdprCallback == ‘function’){
TimesGDPR.common.consentModule.gdprCallback(function(dataObj){
if((typeof dataObj != ‘undefined’) && !dataObj.isEUuser)
(function()
function loadChartbeat()
window._sf_endpt=(new Date()).getTime();
var e = document.createElement(‘script’);
e.setAttribute(‘language’, ‘javascript’);
e.setAttribute(‘type’, ‘text/javascript’);
e.setAttribute(‘src’,
((“https:” == document.location.protocol) ? “https://s3.amazonaws.com/” : “http://”) +
“static.chartbeat.com/js/chartbeat.js”);
trydocument.body.appendChild(e);catch(e)

$( window ).load(function() loadChartbeat(););
)();

});
}

//–END Chartbeat CODE —
//– Facebook Pixel Code —
!function(f,b,e,v,n,t,s)if(f.fbq)return;n=f.fbq=function()
n.callMethod? n.callMethod.apply(n,arguments):n.queue.push(arguments)
;if(!f._fbq)f._fbq=n;
n.push=n;n.loaded=!0;n.version=’2.0′;n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)(window,
document,’script’,’https://connect.facebook.net/en_US/fbevents.js’);
fbq(‘init’, ‘1181341651961954’); // Insert your pixel ID here.
fbq(‘track’, ‘PageView’);
//– DO NOT MODIFY –>
//– End Facebook Pixel Code –>



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here