wordpress blog stats
Connect with us

Hi, what are you looking for?

Royal Enfield database exposed personal info, including passwords and vehicle info, of 452k users; now secured

Motorcyles company Royal Enfield exposed a database of at least 452,000 people in January 2020, which included their names, e-mail IDs, phone numbers, encrypted passwords, vehicle-related information and social media links, Bob Diachenko, cyber threat intelligence director at securitydiscovery.com revealed on Twitter. The information was of those customers who had created a profile on Royal Enfield’s official website. MediaNama has seen a redacted copy of the kind of information that Diachenko could access, courtesy the vulnerability on Royal Enfield’s website. “I discovered 3 IPs with misconfigured databases (i.e. set up without password/login) with what appears to be Royal Enfield’s data,” he told MediaNama. We have reached out to Royal Enfield for comment.

Information about ‘privileged users’ and RE dealers also exposed: In his tweet, he also said that the exposed database also included information about 1,470 “privileged users” and dealers. According to a redacted copy of the data seen by MediaNama, email, password, name, and phone numbers of “privileged users” of Royal Enfield was compromised. Similarly, information related to at least 3,657 Royal Enfield dealers, including their branch code, IDs, names, emails, passwords, sales codes and online booking information was also exposed, Diachenko told MediaNama.

The exposed details of customers, shared by Bob Diachenko with MediaNama

Information about ‘Privileged users’ shared by Bob Diachenko with MediaNama

Diachenko discovered the vulnerability on January 19, and alerted Royal Enfield the same day. He told us that the database was secured the next day. But the vulnerability could have existed for at least two weeks before he finally discovered it, he pointed out. “They [Royal Enfield] thanked me, asked for additional discussion over the phone about the incident and disappeared from my radar, never replied further on,” Diachenko recounted to MediaNama.

3,000 official government email IDs from ISRO, MEA, SEBI were compromised: This vulnerability comes after it was reported that at least 3,000 email IDs of officials belonging to government organisations such as Indian Space Research Organisation (ISRO), Bhabha Atomic Research Centre (BARC), Ministry of Corporate affairs, Ministry of External Affairs, Atomic Energy Regulatory Board (AERB) and Securities and Exchanges Board of India (SEBI), were compromised, with their passwords available in plain text across various leaked databases on the dark web.

Advertisement. Scroll to continue reading.

You May Also Like


Bringing you quick updates on the tech space, policy making and digital rights from India and across the globe. Sensitive data of Domino’s Pizza...

MediaNama is the premier source of information and analysis on Technology Policy in India. More about MediaNama, and contact information, here.

© 2008-2021 Mixed Bag Media Pvt. Ltd. Developed By PixelVJ

Subscribe to our daily newsletter
Your email address:*
Please enter all required fields Click to hide
Correct invalid entries Click to hide

© 2008-2021 Mixed Bag Media Pvt. Ltd. Developed By PixelVJ