Acc to him, he has internal files of 250 employees from IT, Legal, Finance, Marketing, Operations etc. Also customers details and 180M order details (name, ph number, email, delivery address, payment details) and 1M credit cards used to purchase on the @dominos app.
(2/5)
The post made by him mentions that, he will be selling the #breached data for 2 BTC or 8 BTC (according to the package one chooses). However if @dominos_india wants to prevent the data from getting sold, they will need to pay him a ransom of 50 BTC💰
(3/5)
He also added that he has plans to build a search portal like the other group who were behind the #Mobikwik breach last month. However due to some difficulties with #MySQL, he is not able to do so but wants to hire someone who can help him out with it !
(4/5)
If these claims made by this hacker are true, this is going to be a big blow for @dominos_india, it's employees and most importantly it's customers. Expecting @dominos to look and act on it urgently !
Any updates on this incident, will be posted in this thread :)
(5/5)
*UPDATE 1*
When asked bout the samples of the breached data, the hacker responded by saying that he will be provididing samples to only serious buyers with the help of a "Middleman" but one needs to pay 10K USD to have a look at them. The money will be returned if the deal fails.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
🧵 How a misconfig let anyone view PII of Covid-19 patients and modify data related to Covid-19 sero survey (Of Haryana)
So, the Govt Of Haryana has 2 state projects under the @_DigitalIndia programme called : 1. Covid Sample Report Portal 2. Covid-19 Sero Survey Portal
(1/13)
According to official docs, the first portal is used to store COVID-19 testing details uploaded by all COVID-19 laboratories (public or private) for effective monitoring directly by @cmohry
And the second portal is used to estimate and monitor the trends of sero-prevalence of SARS-CoV infection in the general population and high burden cities of Haryana.
Bad day for #job seekers 🤦 @wisdom_jobs which is one of the three major job portals in #India has allegedly been breached and login credentials of around 238K+ of its users have been made public for free by hackers on #telegram and #hacking forums :(
(1/4) @sanjg2k1@IndianCERT
The login credentials which the hackers have made public includes email address & Base64 encoded passwords which literally just takes 2 secs to decode and I have personally verified that almost all of them are working credentials 🥴
(2/4)
Cyber criminals can easily login using these credentials and can get access to a user's name, DOB, number, residence address, education background, marital status and many other info and also make any changes to it, which is scary !
(3/4)