
A significant Indian bank data exposure has been discovered on an unsecured, publicly accessible cloud server. The files were related to transactions processed through the National Automated Clearing House (NACH), a centralized payment system in India used for high-volume, recurring payments like salaries and loan installments.
Security researchers at UpGuard found 273,000 PDF documents in late August containing sensitive bank transfer information. The data was linked to at least 38 different Indian banks and financial institutions.
The exposed transaction forms contained a wealth of personal and financial information, including customer bank account numbers, transaction figures, and contact details.
An analysis of a sample of 55,000 documents revealed that over half mentioned Aye Finance, a prominent Indian lender, with the State Bank of India also appearing frequently.
The misconfigured Amazon-hosted storage server left this critical information accessible to anyone on the internet, posing a severe risk to the individuals involved and raising serious questions about cybersecurity in banking.
Upon discovering the data leak, UpGuard notified Aye Finance, the National Payments Corporation of India (NPCI), and India’s computer emergency response team, CERT-In. The data was secured shortly after CERT-In was alerted.
An NPCI spokesperson denied that the data originated from its systems. “A detailed verification and review have confirmed that no data related to NACH mandate information/records from NPCI systems have been exposed/compromised,” they told TechCrunch.
The incident highlights the challenges in assigning accountability and ensuring timely notification to affected individuals when third-party data handlers are involved.
In other news, automotive data was exposed in a Git file leak at a major roadside assistance and insurance vendor in August.