Trending

HomeBlog
130 Million Records of India-based Import-Export Data Allegedly Leaked in the Darkweb

130 Million Records of India-based Import-Export Data Allegedly Leaked in the Darkweb

On April 29, 2021, a Threat Actor (TA) posted on a cybercrime forum claiming to be in possession of 130 million records of India-based Customs data. Our research indicates that the TA has been quite active on the forum, selling a variety of datasets that directly affects various countries. 

Figure 1 shows the post made by the TA in the cybercrime forum. 

130 Million Records of India-based Import-Export Data Allegedly Leaked in the Darkweb

Figure 1: Forum Post 

On further investigation, Cyble researchers found that the leaked data contains information on ports. It includes Port names, Import and Export Date, Importer name, Importer Address, Supplier name, Supplier Address, Invoice details, Pricing information, Exchange rates, and Importer-Exporter Code. 

Figures 2 and 3 depict the attributes of the data

Attributes of the data leak

Figure 2: Data Attributes 

report-ad-banner
Attributes of the data leak

Figure 3: Data Attributes 

Figures 4 and 5 display samples of the leaked data

Attributes of the data leak

Figure 4: Sample Data 1 

Sample of the data leak

Figure 5: Sample Data 2 

As per our investigation, the leaked dataset is huge, containing unique records of: 

  • 228 Indian ports, 
  • 150,992 importers from 2019,  
  • 135,003 importers from 2020,  
  • 690,519 buyers from 2019, and 
  • 624,855 buyers from 2020 
  • 158208 exporters from 2019, and 
  • 149569 exporters from 2020 

Data leaks like this can adversely impact industries such as Retail and Manufacturing as the leaked information may reveal competitor strategy and pricing details. Apart from this, the leaked information can be further misused by cybercriminals to launch targeted phishing attacks on individual ports, importers, and exporters. 

Security Recommendations: 

Following are some of the essential cybersecurity best practices that help create the first line of control against attackers. We recommend our readers to follow these best practices given below:    

  • Never share your personal information, including financial information, over the phone, email, or SMSs.      
  • Use tough to guess passwords as well as implement multi-factor authentication.      
  • Make it a habit to keep a watch on your financial transactions, and if you notice any suspicious activity, contact your bank immediately.      
  • Turn on the automatic software update feature on your computer, mobile, and other connected devices wherever possible and pragmatic.      
  • Use a reputed anti-virus and Internet security software package on your connected devices, including PC, laptop, and mobile.  
  • People concerned about their exposure on the Dark web can register at  AmIBreached.com to ascertain their exposure.      
  • Never open untrusted links and email attachments without verifying their authenticity.    

About Cyble:  

Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from cybercrimes and exposure in the darkweb. Cyble’s prime focus is to provide organizations with real-time visibility into their digital risk footprint. Backed by Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Startups To Watch In 2020. Headquartered in Alpharetta, Georgia, and with offices in Australia, Singapore, and India, Cyble has a global presence. 

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading