Skip to main content

Tens of Millions of SMS text Messages & Massive Private Data Leaked Online From Hacked Database

True Dialog SMS & Private Data Leaked

Researchers discovered a massive hacked database online that exposed tens of millions of SMS text messages, and private data belongs to a U.S company TrueDialog.
TrueDialog is an American communication company that offering SMS texting solutions to companies such as businesses, universities, and colleges in the USA.
Companies claim that they provide Enterprise-grade SMS Texting service, but this massive data leak indicates and leads to huge risks for their customers who have sent and received an SMS for a year of the period.
By holding an unsecured database, TrueDialog leaked millions of people’s sensitive data across the USA, and the researchers confirmed that the unprotected database belongs to TrueDialog by finding the evidence of their Host ID “api.truedialog.com”.
Discovered database, Also contains millions of account usernames and passwords, PII data of TrueDialog users and their customers, and much more.
Since the uncovered database huge volume of data, there is no doubt that the company compromising the privacy and security of 100 million US citizens across the country.
The Database with 604 GB of data and 1 billion entries that had sensitive data was initially discovered on 26/11/19, and it is hosted by Microsoft Azure and runs on the Oracle Marketing Cloud in the USA.

What Types of Data Stored in the Unprotected Database

Researchers claim that the database contains different entries related to many aspects of TrueDialog’s business model and its a rare one that the single database with this much huge volume of sensitive data.
The database contains millions of email addresses, usernames, cleartext passwords, and base64 encoded passwords which can be easily decrypted.
According to VPNMentor research “Tens of millions of entries from messages sent via TrueDialog and conversations hosted on the platform and the Messages including,
  • Full Names of recipients, TrueDialog account holders, & TrueDialog users
  • Content of messages
  • Email addresses
  • Phone numbers of recipients and users
  • Dates and times messages were sent
  • Status indicators on messages sent, like Reading receipts, replies, etc.
  • TrueDialog account details
TrueDialog
Username & Password
TrueDialog
SMS conversation
The researcher also found some of the technical logs that revealed important details as to how the database is structured and managed.
This massive leak could lead to potential risks for the customers, and if it reached the wrong hand, cybercriminals could perform various attacks such as Phishing and scams, Identity theft, and Fraud, Account Takeover and Blackmail the customers.
TrueDialog has been finally closed the database and the database now secured. you can also check the important network security principles to protect businesses from cyber-attacks.

Comments

Popular posts from this blog

10 Best Forum Software For Webmasters

10 Best Forum Software For Webmasters Do you want to create your online discussion forum or online community where people can discuss about their favorite topics? In this article, you can see 10 best forum software (scripts for setting up discussion forums) that can be used free of cost. Although some scripts are paid but rest of these forum scripts are free to use.You only need to buy hosting space and domain name for your website and after then you can install any of these forum scripts to start your own discussion forums on the internet. Online discussion forums generate huge page views because thousands of people want to join online discussion forums to ask questions or share knowledge. Some of online marketers join forums to discuss about their products with community members. You don't need to acquire any kind of technical skill to run a professional discussion forums because these days, almost all web hosting providers offer one click script installer which h...

How to Hack WhatsApp using just a GIF

A picture is worth a thousand words, but a GIF is worth a thousand pictures. Today, the short looping clips, GIFs are everywhere—on your social media, on your message boards, on your chats, helping users perfectly express their emotions, making people laugh, and reliving a highlight. But what if an innocent-looking GIF greeting with Good morning, Happy Birthday, or Merry Christmas message hacks your smartphone? Well, not a theoretical idea anymore. WhatsApp has recently patched a critical security vulnerability in its app for Android, which remained unpatched for at least 3 months after being discovered, and if exploited, could have allowed remote hackers to compromise Android devices and potentially steal files and chat messages. WhatsApp Remote Code Execution Vulnerability The vulnerability, tracked as  CVE-2019-11932 , is a double-free memory corruption bug that doesn't actually reside in the WhatsApp code itself, but in an open-source GIF image parsing library that What...

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE

A high-severity vulnerability could allow cybercriminals to push malware or remotely execute code, using seemingly innocuous messages. Security researchers have identified a JavaScript vulnerability in the WhatsApp desktop platform that could allow cybercriminals to spread malware, phishing or ransomware campaigns through notification messages that appear completely normal to unsuspecting users. And, further investigation shows this could be parlayed into remote code-execution. The desktop platform has more than 1.5 billion monthly active users. The high-severity bug (rated 8.2 on the CVSS severity scale) could impact those that also use WhatsApp for iPhone, if they don’t update their desktop and mobile apps, and if they don’t use newer versions of the Chrome browser. “A vulnerability [ CVE-2019-18426 ] in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting (XSS) and local file reading,” acc...