CDSL Breach Leaks Millions of Investor Details

  • By David Lukic
  • Published: Nov 30, 2021
  • Last Updated: Mar 18, 2022

An error has leaked personal and financial data belonging to millions of Indian investors. The Indian Central Depository Services Limited subsidiary - CDSL Ventures Limited (CVL) - announced this while reporting a data breach on its network. Investigations revealed that the breach happened twice within the space of ten days.

What Happened?

On October 19, the CyberX9 cybersecurity team uncovered a significant security weakness in CDSL's network. CLV was revealing the personal and financial data of more than 43 million investors online. Then on October 29, the team found a complete bypass for the fix that CDSL implemented to correct the flaw earlier observed.

“We verified the fix before publication, and it was no longer exploitable. Later, on October 29, our research team got to work again, and within a couple of minutes, they found an easy and complete bypass for the fix that CDSL implemented to patch the earlier reported vulnerability,”

reported the team.

Reportedly, investors are most discouraged by the frequency of the attacks. The report revealed that the breach occurred twice within ten days, and because CDSL patched the second occurrence within a couple of minutes, CyberX9 argued that they could have corrected the first breach within two hours. But from what CVL said, it took almost one week to correct the error. With the amount of data exposed, many fear possible phishing attacks, tax refund scams, business email compromise scams, or extortions.

What Details Were Exposed?

The vulnerability affected CDSL’s Know-Your-Customer (KYC) wing. The research team at CyberX9 discovered that personal and financial information on investors who did their market securities with KYC were exposed. In total, 43.9 million Indian investors were affected.

Among leaked personal details are:

  • Full name
  • Gender
  • Marital status
  • Parent’s name
  • Date of births
  • Nationality
  • Occupation
  • Contact details
  • Home addresses
  • Email addresses
  • PAN numbers

Leaked financial data include:

  • Annual income tax return
  • Net worth
  • Demat account number
  • Broker name
  • CDSL Client ID
“We strongly suspect that the data might have already been stolen by malicious attackers. There is a need for a fair security audit of CDSL by the government,”

said CyberX9 in a press release.

CDSL Investor Detail Breach

What is CDSL Doing About It?

The CyberX9 cybersecurity team started internal investigations immediately they uncovered the breach. Their efforts yielded good results because they successfully repaired the reported flaw within the network.

CDSL also took prompt actions to minimize the damage. They reported the breach to appropriate authorities like CERT-In and NCIIPC. Additionally, they placed an official notification on their website. Because the research team took immediate action, CDSL recently allayed any fear of future cyber threats. When contacted about the status of this latest incident, CDSL said there is no more security issue or data vulnerability.

Cybersecurity Tips for Investors

Modern investors rely heavily on the internet for several activities like checking accounts holdings, trading, and making deposits. Protecting your online accounts from fraud is now part of normal best practices. The following tips can help you improve your account security.

  • Use a Passphrase in place of a password: According to the U.S Securities and Exchange Commission, a passphrase is a special kind of password. Instead of a set of numbers, alphabets, and symbols, it uses a series of words. When prompted to log in, enter the words correctly to avoid being locked out of your account.
  • Use strong and secure passwords: A strong password uses at least eight characters. It will be a combination of numbers, alphabets, and special symbols. Avoid using any personal information like birthdays or names in your password. The idea here is to make it impossible for others to guess your password.
  • Activate multi-factor authentication: A two-step verification requires a second verification after you have supplied the password. Only you know the answer to the security question. Even if someone gains access to your login details, it will be impossible to steal from you.
About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Is It Possible to Erase Yourself from the Internet?

Is It Possible to Erase Yourself from the Internet?

Our digital footprint, the trail of data and information left behind while using the internet, can be overwhelming. It encompasses everything from our social media posts and the websites we have visited to the emails we've sent and the online searches we have conducted.

Cybersecurity Threats: What You Need to Know About Piggybacking

Cybersecurity Threats: What You Need to Know About Piggybacking

In cybersecurity, piggybacking refers to an unauthorized person gaining access to a restricted area or system by exploiting the access privileges of an authorized user, typically by following them or leveraging their credentials, usually without their knowledge or consent.

What You Need to Know about the Coast Guard Data Breach

What You Need to Know about the Coast Guard Data Breach

The Coast Guard is the only branch of the United States military in the Department of Homeland Security. It enforces federal law, controls the nation's borders and maritime Approaches, and protects the United States ports and waterways.

Mars Hydro Security Flaw Puts IoT Users at Risk

Mars Hydro Security Flaw Puts IoT Users at Risk

Mars Hydro is a leading Chinese brand producing a wide range of Internet of Things (IoT) devices for indoor gardening and the hydroponics industry.

What You Need to Know about the Community Health Center Data Breach

What You Need to Know about the Community Health Center Data Breach

Community Health Center (CHC) is a non-profit founded in 1972 and headquartered in Middletown, Connecticut. It offers a broad range of services, including dentistry, primary care, urgent care, specialty medical services, and behavioral health.

What You Need to Know about the DeepSeek Data Breach

What You Need to Know about the DeepSeek Data Breach

DeepSeek, founded by Liang Wenfeng, is an AI development firm located in Hangzhou, China. The company focuses on developing open source Large Language Models (LLMs) and specializes in data analytics and machine learning.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close