Certified Divers Had Their PII Exposed Due to PADI Blunder

  • The Professional Association of Diving Instructors has exposed the PII of 2.3 million of its members.
  • The incident occurred due to a misconfiguration on an Elasticsearch server happening on April 23, 2020.
  • The data that was compromised includes full names, emails, mobile phone numbers, and more.

The “Professional Association of Diving Instructors” (PADI) has exposed the personally identifiable information of its members after leaving an Elasticsearch server open for access without setting up a password. The cluster contained 2,313,197 records that concern American divers who had been certified by PADI in the past. Researcher Bob Diachenko discovered the leaky server on May 6, 2020, but unfortunately, the first indexing on Shodan happened way back (on April 23, 2020). PADI received the notice and secured the database today, but they have provided no explanations regarding this matter.

The exposed information includes the following details:

  • full name
  • phone / home phone / mobile phone
  • email address
  • mailing address
  • date of birth

Thankfully, the data doesn’t include payment information, although fees are involved in the process of getting certified by PADI. Still, the above information would be useful in the hands of phishing actors, scammers, and identity theft actors. For example, emails claiming that the recipient would need to renew their certification and pay a fee for the process would be a typical case aiming to steal credit card data and also money. Spoofing the PADI website and setting up a convincing phishing one instead shouldn’t be too hard to do for skillful actors.

2020 Certification Cards
Source: PADI

As Diachenko points out, assuming that the data hasn’t fallen into the wrong hands already would be naive. Typically, these databases are noticed within three days maximum by automated crawlers, are promptly downloaded, thoroughly evaluated by hackers, and eventually used or sold to others. In the best-case scenario, indexable Elasticsearch clusters are now being destroyed by the “Nightlionsecurity” worm at rates as high as 50%. The hacker who’s carrying out these destructive attacks, wiping databases, and trying to put the blame on the Night Lion Security firm has unknown motives. Still, it’s yet another factor to consider nowadays.

Judging from the initial response of PADI, it is unlikely that we’ll see them sending out notifications to the affected individuals. We have asked them directly, and we’ll update this piece if and when we hear back from them. Until that happens, PADI certified divers should beware of any unsolicited email messages or SMS that ask their immediate attention. Also, you should contact PADI and demand to learn more about what information was exposed and if they are willing to offer an identity theft protection service to you now.

How to Watch Bachelor in Paradise Season 8 (2022) Online From Anywhere
One of the most popular dating reality TV shows is back with a brand new season, and you will be able to...
How to Watch Reasonable Doubt Online From Anywhere: Stream the Court Series
A new and exciting series is set to premiere soon, and you will be able to stream the entire season online just...
How to Watch La Brea Season 2 Online From Anywhere: Stream the Mystery Drama Series
The second season of the mystery drama you love will premiere soon, and you'll be happy to know the episodes will be...
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari