Details of 25,000 Bezop Token Users Exposed by MongoDB Database
CYBER NEWS

Details of 25,000 Bezop Token Users Exposed by MongoDB Database

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Security researchers at Kromtech recently came across a MongoDB database that contained the personal details of more than 25,000 users who invested in the Bezop (BEZ) token. The database contained plenty of personal details including full names, home addresses, email addresses, encrypted passwords, wallet information, scanned passports, driver’s licenses and in other cases – IDs.

More specifically, the database encompassed personal details on 6,500 ICO investors. The rest of the details belonged to users who took part in the public bounty program for which they received Bezop tokens.

Related Story: 7.8 Billion Records Compromised via Data Breaches in 2017 Alone

More about the Bezop Platform

The platform’s white paper explains that Bezop is a decentralized peer-to-peer ecommerce order management and processing system, an autonomous buyer-seller protection service, and a simple value added tax (VAT) collection system – all powered by smart contracts and built on a decentralized blockchain network.

Why was this information held in the database in the first place? The abundance of personal details was needed for a bounty program initiated by the Bezop team. The program took place earlier in 2018 when the Bezop platform gave away tokens to users who promoted BEZ on their own social media accounts.

MongoDB Data Incident Officially Confirmed

A company representative has already admitted to this data breach, explaining that the MongoDB database was negligently exposed online in the midst of a DDoS attack its developers were dealing with. The DDoS attack took place on January 8, and it proves how devastating these attacks are to businesses.

Fortunately, no user funds were compromised during this time, and the database has already been secured. Nonetheless, it is still a troubling incident as the database lacked authentication system meaning that anyone connecting to it could access the stored personal details of thousands of users.

Related Story: MongoDB Ransomware Attacks Misconfigured Servers

This is not the first incident involving MongoGB databases. In January 2017, misconfigured MongoDB databases became targets of ransomware.

Servers running MongoDB were first targeted in December 2016, but the scale of the malicious attempts was small. The situation quickly escalated, because many of the compromised databases hadn’t been set to require a password for access. This lack of authentication once again made remote attacks easy to accomplish.

Avatar

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...