273,000 Indian Bank Transfer Records Exposed in National Automated Clearing House Cloud Server Leak

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

A significant Indian bank data exposure has been discovered on an unsecured, publicly accessible cloud server. The files were related to transactions processed through the National Automated Clearing House (NACH), a centralized payment system in India used for high-volume, recurring payments like salaries and loan installments.

Nature of the NACH Data Leak

Security researchers at UpGuard found 273,000 PDF documents in late August containing sensitive bank transfer information. The data was linked to at least 38 different Indian banks and financial institutions.

Redacted example of exposed transaction form
Redacted example of exposed transaction form | Source: UpGuard

The exposed transaction forms contained a wealth of personal and financial information, including customer bank account numbers, transaction figures, and contact details. 

An analysis of a sample of 55,000 documents revealed that over half mentioned Aye Finance, a prominent Indian lender, with the State Bank of India also appearing frequently. 

The misconfigured Amazon-hosted storage server left this critical information accessible to anyone on the internet, posing a severe risk to the individuals involved and raising serious questions about cybersecurity in banking.

Data Breach Response

Upon discovering the data leak, UpGuard notified Aye Finance, the National Payments Corporation of India (NPCI), and India’s computer emergency response team, CERT-In. The data was secured shortly after CERT-In was alerted. 

An NPCI spokesperson denied that the data originated from its systems. “A detailed verification and review have confirmed that no data related to NACH mandate information/records from NPCI systems have been exposed/compromised,” they told TechCrunch.

The incident highlights the challenges in assigning accountability and ensuring timely notification to affected individuals when third-party data handlers are involved.

In other news, automotive data was exposed in a Git file leak at a major roadside assistance and insurance vendor in August.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: