Trending

HomeBlog
20 Million Aadhaar Card Numbers Leaked Allegedly from Tamil Nadu PDS

20 Million Aadhaar Card Numbers Leaked Allegedly from Tamil Nadu PDS

In the course of our routine darkweb monitoring, the Cyble research team came across a post by a Threat Actor (TA) on July 1, 2021. In the post on the cybercrime forum, the TA claims to be in possession of the Tamil Nadu Public Distribution System (TNPDS) database. TNPDS is the Department of Food Supply and Consumer Protection of Tamil Nadu. The breach has allegedly exposed 31M personally identifiable information (PII) of Indian citizens from Tamil Nadu, in addition to 20M Aadhaar numbers, thereby compromising a total of 51M records. A 12-digit unique identification number issued to residents of India, Aadhaar is used as a proof of identity and/or proof of address in KYC documents. 

Post by the TA in the Forum  

Figure 1: Post by the TA in the Forum  

Our analysis indicates that the leaked data contains sensitive information such as: 

  • Full Name 
  • Beneficiary ID  
  • Beneficiary Member ID 
  • C/O (for Address) 
  • Full Address
  • Date of Record Creation  
  • District  
  • Date of Birth 
  • Gender  
  • House Number  
  • UID (Unique ID/Aadhaar number)  
  • Year of Birth 

The figure below showcases a sample of the leaked records.  

ample of the leaked records.

Figure 2: Sample of the Leaked Data 

As per our investigation the breached records consist of: 

report-ad-banner
  • 20M Aadhaar numbers 
  • 31M PII Records (excluding Aadhaar) 
  • Total 51M records 

The compromised PII has a high potential for being misused by attackers to carry out malicious activities involving identity theft or social engineering attacks.  
As data breaches continue to dominate headlines around the world, organizations are increasingly upgrading their data security practices. However, cybercriminals are always on the lookout for newer ways to evade the defenses of organizations to gain unauthorized access to valuable government and corporate data. 

What is Aadhar? Aadhaar is a 12-digit unique identity number that can be obtained voluntarily by residents or passport holders of India, based on their biometric and demographic data. The data is collected by the Unique Identification Authority of India (UIDAI), a statutory authority established in January 2009 by the government of India, under the jurisdiction of the Ministry of Electronics and Information Technology, following the provisions of the Aadhaar (Targeted Delivery of Financial and other Subsidies, benefits and services) Act, 2016.

How to verify if you’re impacted? Cyble has indexed the leaked records on the data breach monitoring and notification platform, amibreached.com. Those who are concerned about their exposure can visit the website to gain more information.

Our Recommendations:

Below are some of the essential cybersecurity best practices to help create the first line of control against attackers. We recommend our readers to take these measures for safeguarding themselves against ensuing cyberthreats:  

  • Incorporate risk management practices and conduct a regular risk assessment of different assets. 
  • Never share your personal information, including financial information, over the phone, email, or SMSes.    
  • Use strong passwords and implement multi-factor authentication. 
  • Consistently monitor your financial transactions, and if you notice any suspicious activity, contact your bank immediately.  
  • Never open untrusted links and email attachments without verifying their authenticity.   
  • Consider registering on Cyble’s amibreached.com platform to stay up-to-date on your information exposure in the deepweb and darkweb.

About Cyble:   

Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from cybercrimes and exposure in the darkweb. Cyble’s prime focus is to provide organizations with real-time visibility into their digital risk footprint. Backed by Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Startups To Watch In 2020. Headquartered in Alpharetta, Georgia, and with offices in Australia, Singapore, and India, Cyble has a global presence. To learn more about Cyble, visit www.cyble.com. 

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading