Bengaluru-based 'JusPay' refutes 10 cr card data breach claim, says only 3.5 cr users' info leaked

Agencies
January 6, 2021

Juspay.jpg

Bengaluru, Jan 6: Bengaluru-based digital payments gateway JusPay on Tuesday clarified that about 3.5 crore records with masked card data and card fingerprint were compromised by a hacker and the claim of 10 crore cardholders' data being affected is “incorrect". Responding to claims made by independent cyber security researcher Rajshekhar Rajaharia on Sunday that data of nearly 10 crore credit and debit card holders in the country is being sold for an undisclosed amount on the Dark Web -- leaked from a compromised server of Juspay, the company said in a fresh statement that none of its merchants and their customers are at any risk.

"The masked card data is used for display purposes on merchant UI and cannot be used for completing a transaction. A part of user metadata in our system which has non-anonymised, plain-text email IDs and phone numbers got compromised," the company informed.

"On August 18, 2020, an unauthorised attempt on our servers was detected and terminated when in progress," it added.

According to JusPay, no full card numbers, order information, card PINs and passwords were leaked.

"We conducted a thorough audit on the day of the incident which confirmed that our 'Secure Data Store' which hosts the 16-digit encrypted card numbers was not accessed and remains secure. The cyberattack was identified in an isolated/separate system," JusPay elaborated.

"We can confirm that the compromised data does not contain any transaction or order information, as the intrusion was terminated before such an access."

Rajaharia had told IANS that the data was being sold on the Dark Web for an undisclosed amount via cryptocurrency Bitcoin.

"For this data, hackers are also contacting via Telegram," he said, adding that if the hackers can find out the Hash algorithm used to generate the card fingerprint, they will be able to decrypt the masked card number.

"In this condition, all 10 crore cardholders are at risk," Rajaharia noted.

JusPay said that it has made significant investments in security and data governance and its policies are aligned to globally accepted data protection standards.

"We did identify gaps in some of the older access keys and moved them to non-access key-based authentication supported by hosting providers. We have also made two-factor authentication (2FA) mandatory for all the tools accessed by our teams," the company said.

According to Saurabh Sharma, Senior Security Researcher (GReAT), Kaspersky (APAC), data leaks due to internal vulnerabilities has become a common instance in India, especially in the last two years.

"Enterprises and institutions have begun to understand the importance of having a strong security framework to save themselves from an external attack by a cybercriminal. However, they tend to overlook the internal vulnerabilities that can prove to be very damaging to their reputation and business if exploited by the bad guys," Sharma told IANS.

Regular network and server evaluation, proactive detection of zero-day vulnerabilities and patching them immediately, launching attractive bug-bounty programmes and promptly informing the users of a potential leak are some of the "mandatory steps that large enterprises and institutions should follow in order to stay away from cybercriminals and save their reputation," he added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 1,2025

Udupi: In a shocking case of investment fraud, a 72-year-old man from Udupi, Karnataka, lost Rs 49 lakh after falling prey to a deceptive stock market scheme. The incident highlights the growing menace of online scams targeting unsuspecting individuals.

According to the complaint filed by Francis Castelino, an unknown individual added his son's mobile number to a WhatsApp group titled "Stock Market Navigation." The group shared stock market insights and promised lucrative returns, convincing Castelino’s son to invest. Trusting the information, the son persuaded his father to make substantial investments.

On December 30, 2024, Castelino transferred Rs 17,00,000, his wife contributed Rs 10,50,000, and their son invested Rs 21,50,000 to the bank account provided by the fraudsters. 

However, when Castelino attempted to withdraw the invested money, he and his family were pressured to reinvest further. Realizing that the promised profits and their principal amount were not forthcoming, the family approached the police for help.

A case has been registered at the Udupi CEN Police Station under Sections 66(C) and 66(D) of the IT Act and 318(4) BNS. Investigations are underway to track down the culprits and recover the lost funds.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 4,2025

Mangaluru: Dakshina Kannada MP Captain Brijesh Chowta met Union Home Minister Amit Shah in New Delhi on Friday to discuss key issues affecting the security and development of the region. The meeting highlighted several urgent concerns, ranging from counter-terrorism measures to infrastructure upgrades.

During the meeting, Chowta strongly advocated for establishing a National Investigation Agency (NIA) Centre in Mangaluru. He pointed out the city’s vulnerability to threats such as Islamic radicalisation, sleeper cells, and the activities of groups like SDPI and PFI. Citing the unrest during the Citizenship Amendment Act (CAA) protests, Chowta emphasized the ability of radical groups to incite large-scale disruptions. He argued that Mangaluru’s strategic coastal location necessitates an NIA Centre to bolster counter-terrorism operations and ensure regional security.

Chowta also discussed the Indian Coast Guard Academy, sanctioned for Mangaluru in 2020. He highlighted its potential to enhance India’s maritime security through advanced training in coastal defence, disaster response, and surveillance. Situated near the Arabian Sea and Mangalore Port, the academy is strategically positioned to address challenges in regions like Lakshadweep and the Maldives, aligning with India’s geostrategic interests.

The MP proposed the establishment of a Sainik School in Mangaluru to nurture leadership, discipline, and patriotism among local youth. He emphasized that such an institution would not only provide quality education but also act as a feeder for the armed forces, enhancing the region’s defence readiness. Chowta suggested pairing the school with a military installation, further strengthening coastal defence capabilities and supporting national security goals.

Addressing infrastructure, Chowta underscored the need to improve the Mangaluru-Bengaluru railway and road networks. He argued that enhanced connectivity would unlock the region’s economic potential, streamline logistics for New Mangalore Port, and support key industries such as fisheries, agriculture, and manufacturing. Additionally, upgraded infrastructure would boost trade, tourism, and employment opportunities.

On economic development, Chowta urged the revival of cooperative banks under the Ministry of Cooperatives. He proposed increased funding and loan facilities for businesses and farmers to enhance financial inclusion and regional economic stability. Strengthening fisheries cooperatives, he noted, would provide local fishermen with better access to financial services, loans, and insurance, improving productivity and security.

The MP’s discussions reflected a comprehensive vision for balancing security, infrastructure, and economic growth in Dakshina Kannada, aligning with both regional and national priorities.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 8,2025

Bengaluru: In a sweeping anti-corruption operation, the Karnataka Lokayukta conducted simultaneous raids on the properties of eight government officials across eight districts on Wednesday. The raids, part of ongoing investigations into disproportionate assets cases, targeted over 20 locations linked to these officials.

According to Lokayukta sources, the coordinated operation spanned Bengaluru, Mandya, Bidar, Belagavi, Tumakuru, Gadag, Ballari, and Raichur. Properties of the following officials were under scrutiny:

Shobha – Joint Commissioner, Bengaluru Transport Department

S. N. Umesh – Health and Family Welfare Officer, Kadur

Ravindra – Inspector, Minor Irrigation and Groundwater Development Sub-Division, Bidar

Prakash Sridhar Gaikwad – Tahsildar, Khanapur

S. Raju – Retired RTO Officer, Tumakuru

Huchesh alias Huchappa – Assistant Executive Engineer, Gadag Municipality

R. H. Lokesh – Welfare Officer, Backward Class Department, Ballari

Huliraja – Junior Engineer (Electric), Raichur

Lokayukta officials are thoroughly examining documents, assets, cash, and other valuables found during the raids.

This operation is the Lokayukta’s first major crackdown in 2025. Notably, on December 12, the watchdog had unearthed disproportionate assets worth Rs 48.55 crore in raids on properties belonging to 10 government officials.

The Lokayukta’s intensified efforts signal its commitment to curbing corruption and ensuring accountability among government officials.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.