RailYatri suffered another data breach exposing data of more than 31 million users

Share via:

Indian train ticketing platform RailYatri suffered another data breach, exposing the personal information of over 31 million (31,062,673) users. This is the second incident in nearly three years, following a data breach at the government-approved ticketing platform that exposed the personal information of approximately 7 lakh users.

Email addresses, full names, genders, phone numbers, and locations are among the information contained in the database. In August 2020, the Indian Computer Emergency Response Team (CERT-In) became involved after the company claimed it was a test server and later secured it. On February 16, hackers attacked RailYatri servers again, stealing the data of 31 million users and posting it on the cybercrime forum BreachForums, according to cybersecurity researcher Anurag Sen.

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Popular

More Like this

RailYatri suffered another data breach exposing data of more than 31 million users

Indian train ticketing platform RailYatri suffered another data breach, exposing the personal information of over 31 million (31,062,673) users. This is the second incident in nearly three years, following a data breach at the government-approved ticketing platform that exposed the personal information of approximately 7 lakh users.

Email addresses, full names, genders, phone numbers, and locations are among the information contained in the database. In August 2020, the Indian Computer Emergency Response Team (CERT-In) became involved after the company claimed it was a test server and later secured it. On February 16, hackers attacked RailYatri servers again, stealing the data of 31 million users and posting it on the cybercrime forum BreachForums, according to cybersecurity researcher Anurag Sen.

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Website Upgradation is going on for any glitch kindly connect at office@startupnews.fyi

More like this

HEC Infra Projects Limited Wins Rs 16.35 Cr Order...

Ahmedabad (Gujarat) , January 15: HEC Infra Projects...

CCPA Fines Amazon, Flipkart, Meesho For Illegal Walkie-Talkies Sales

Consumer watchdog Central Consumer Protection Authority (CCPA) has...

The New Threats: Attackers Don’t Just Break In, They...

These days, malicious actors succeed not by breaking...

Popular

Upcoming Events

iPhone 18 Pro Is Coming This Year: 12 Major...

Apple’s Pro iPhone lineup has long been where the...

How one startup is using prebiotics to try and...

Five years from now, the world might start...

Gemini Personal Intelligence Previews What We Can Expect From...

The future of digital assistants is beginning to take...
iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv iptv