Mumbai bank falls victim to a data breach.
24 April 2022BREACHAWARE HQ
A total of 12 breach events
were found and analysed resulting in 3,811,101 exposed accounts
containing a total of 18 different data types of personal datum
. The breaches found publicly and freely available included Lakh, RIA Novosti, JDM Style Tuning, tipobet365 and Porno Board. Sign in to view the full
library of breach events which includes, where available, reference articles relating to
each breach.
Categories of Personal Data Discovered
Financial Data, Communications Data, Technical Data, Contact Data, Socia-Demographic Data, Usage Data, Locational Data, Social Relationships Data.
Data Breach Analysis
Among the affected entities is RIA Novosti a major Russian state-affiliated news agency. The inclusion of such a prominent media outlet in this breach set underscores the geopolitical sensitivity and reputational stakes involved when journalistic platforms are compromised. Whether targeting internal operations, subscriber systems, or commenter databases, breaches affecting media organisations can influence both public trust and information integrity.Another impacted site, JDM Style Tuning, represents the automotive enthusiast community, specifically fans of Japanese domestic market (JDM) vehicles. While the data held by such niche forums may seem low-risk at first glance, they often include personal contact details, location-based information, and private messaging between members. For highly engaged users, this information can be linked to physical assets like vehicles or garage locations, making targeted scams or harassment possible.
Tipobet365, a gambling and sports betting platform, was also identified among the breached entities. Online betting services consistently attract the attention of cybercriminals due to the inherent combination of financial information and user behavioural data. Breaches here can lead not only to immediate financial fraud but also long-term privacy concerns for users operating in regions where betting is restricted or stigmatised.
Equally notable is the inclusion of Porno Board, an adult content discussion platform. As with other breaches involving adult-oriented websites, the exposure of account data in such contexts carries a unique form of reputational and personal risk for users. The nature of these platforms often leads to pseudonymous interaction, but linkage to a real identity, even indirectly, can have serious privacy, employment, or personal consequences.
Lakh, while less widely recognised, adds to the overall breach scope and suggests potential targeting of smaller or regionally specific platforms, which may lack the robust security infrastructure of larger entities.
This group of breach events exemplifies how deeply personal data is embedded into virtually every corner of the online experience, from reading the news and engaging in hobbies to entertainment and finance. The convergence of mainstream and niche digital spaces in a single breach dataset reinforces that no user segment is immune from the risks of poor cybersecurity practices.
With over 3.8 million accounts exposed, this round of analysis continues to highlight the ongoing vulnerability of internet infrastructure. While individual breach sizes may vary, the cumulative threat they pose to digital privacy is significant. Many of these platforms may not be perceived by users as particularly risky or sensitive, yet the consequences of even seemingly minor data leaks can snowball, fuelling targeted scams, phishing attacks, or broader identity compromise.
As always, users are urged to treat all online services, regardless of industry or perceived importance, as potentially vulnerable. Use unique passwords, enable two-factor authentication wherever possible, and remain alert to irregular account activity or unfamiliar communication channels.
For the organisations involved, especially those in industries with higher reputational risk like adult content and gambling, these breaches should serve as a wake-up call. Data stewardship is no longer a backend concern, it is central to user trust, regulatory compliance, and long-term viability.
Spotlight
An interesting week for the Research Team as they were doing some ad-hoc research for Season 2 BBC Podcast 'The Lazarus Heist'. This is a story of a hacking ring attempting to steal a billion dollars. Check out Season 1, it's a good listen.Back to breached data, the team saw a bank in Mumbai, which is running a scholarship for children facing “extreme hardship” have a fairly large data breach. The leak consisted of a wide variety of datasets including a lot of personal information salary etc. as well as large amount of physical addresses and names. Hackers don't care who you are.
A member of the team also came across a user distributing 40 million personal mobile numbers, with 4 million associated email addresses. The data file discovered had a filename known as Lakh. We have not been able to verify the source of the breach yet, as soon we do we'll update this description.
Another gambling site which is based on an offshore tax haven in the Dutch Caribbean had been breached. As mentioned, betting companies are rich in datasets including mobile numbers and IP addresses.
Another interesting breach with more than the usual conversations on a forum is FDCServers.net., described as a 'web hosting server solutions for bandwidth intensive applications, websites, media, gaming or e-commerce platforms'. Data types included names, usernames, passwords and phone numbers. This is not a large breach but the team was drawn to the negative chat surrounding this company.
The team also noted that the .ru domains continue to be dumped, and a plethora of industry sectors' domains exposed such as education, adult websites, health, animal, IT, government and financial services.