Indain Bus Service data exposed!!!
Hello Everyone!!!
Welcome to Dark Street Hackers where we believe in spreading knowledge and awareness in the field of cybersecurity. In this latest era, we all use location-based services to get better and easy solutions. The same thing we are going to discuss today in this article. Yes, I am going to share news of data breach related to the location service of few Indian bus systems.
With growing technology, many metro cities of India has adopted real-time location service for citizens to know the timings and the current location of public transport buses. Today we have a piece of bad news as this service is been breached and more than 11 thousand buses are exposed. This massive data breach has been done from improper secured ElasticSearch server, Kibana Server, and admin page of InfluxDB. Justin Paine, Head of Trust & Safety at Cloudflare, has found that due to a misconfiguration in the server, almost 27 Indian Government agencies data has been leaked. As per the research of Justin Paine, these servers are easily available to connect on the same port of server as it's authentication is not yet enabled.
There are many many government agencies which handle public transport departments in various cities. Justin has collected a bunch of information available from these vulnerable servers. One of the agency stores the full name of rider and the other stores' users' email addresses. Many servers consist of information including route names, bus license plate number, start and stop station names, GPS status, usernames, and email addresses. The researcher has also submitted the list of the government transport agencies whose data has been exposed to him. The below mentioned are a few of them:-
-> ACTSL = Allahabad City Transport Services Limited
-> AICTSL = Atal Indore City Transport Services Limited
-> AMCTSL = Agra-Mathura City Transport Services Limited
-> BCLL = Bhopal City Link Limited
-> BMTC Banglore metropolitan transport Corporation
-> BSRTC = Bihar State Road Transport Corporation
-> CSTC = Calcutta State Transport Corporation
-> DTC = Delhi Transport Corporation
-> IBUS = Indore Bus Rapid transit System
-> JCTSL = Jaipur City Transport Services Limited
-> KCTSl = Kanpur City Transport Services Limited
-> KMRL = Kochi Metro Rail Limited
-> UCTSL = Ujjain City Transport Services Limited
-> UPSRTC = Uttar Pradesh State Road Transport Corportaion
Justin Paine has proved that the servers are reachable since 30th November 2018. And no one knows that till how long time this data will be available like this and also it is not known that whether someone else is having access to this information or not. After finding vulnerability and data exposure incident, the researcher has submitted his report to India's CERT on #0th November 2018, and the team of CERT patched that server and protected it by December 22, 2018.
Thank you and stay connected for more uodated!!!
Welcome to Dark Street Hackers where we believe in spreading knowledge and awareness in the field of cybersecurity. In this latest era, we all use location-based services to get better and easy solutions. The same thing we are going to discuss today in this article. Yes, I am going to share news of data breach related to the location service of few Indian bus systems.
With growing technology, many metro cities of India has adopted real-time location service for citizens to know the timings and the current location of public transport buses. Today we have a piece of bad news as this service is been breached and more than 11 thousand buses are exposed. This massive data breach has been done from improper secured ElasticSearch server, Kibana Server, and admin page of InfluxDB. Justin Paine, Head of Trust & Safety at Cloudflare, has found that due to a misconfiguration in the server, almost 27 Indian Government agencies data has been leaked. As per the research of Justin Paine, these servers are easily available to connect on the same port of server as it's authentication is not yet enabled.
There are many many government agencies which handle public transport departments in various cities. Justin has collected a bunch of information available from these vulnerable servers. One of the agency stores the full name of rider and the other stores' users' email addresses. Many servers consist of information including route names, bus license plate number, start and stop station names, GPS status, usernames, and email addresses. The researcher has also submitted the list of the government transport agencies whose data has been exposed to him. The below mentioned are a few of them:-
-> ACTSL = Allahabad City Transport Services Limited
-> AICTSL = Atal Indore City Transport Services Limited
-> AMCTSL = Agra-Mathura City Transport Services Limited
-> BCLL = Bhopal City Link Limited
-> BMTC Banglore metropolitan transport Corporation
-> BSRTC = Bihar State Road Transport Corporation
-> CSTC = Calcutta State Transport Corporation
-> DTC = Delhi Transport Corporation
-> IBUS = Indore Bus Rapid transit System
-> JCTSL = Jaipur City Transport Services Limited
-> KCTSl = Kanpur City Transport Services Limited
-> KMRL = Kochi Metro Rail Limited
-> UCTSL = Ujjain City Transport Services Limited
-> UPSRTC = Uttar Pradesh State Road Transport Corportaion
Justin Paine has proved that the servers are reachable since 30th November 2018. And no one knows that till how long time this data will be available like this and also it is not known that whether someone else is having access to this information or not. After finding vulnerability and data exposure incident, the researcher has submitted his report to India's CERT on #0th November 2018, and the team of CERT patched that server and protected it by December 22, 2018.
Thank you and stay connected for more uodated!!!
0 Comments