Tuesday, November 12, 2024
Homecyber securityHackers Claiming Dettol Data Breach: 453,646 users Impacted

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

Published on

Malware protection

A significant data breach has been reported by a threat actor known as ‘Hana,’ who claims to have compromised the personal information of 453,646 users of Dettol India. The breach was announced via a post on the social media platform X by FalconFeedsio.

Details of the Breach

According to the post, the compromised data includes sensitive information such as user IDs, usernames, passwords, parents’ names, mobile numbers, addresses, states, and PIN codes.

The breach has raised serious concerns about the security protocols at Dettol India, a leading brand in health and hygiene products.

- Advertisement - SIEM as a Service

The data breach was allegedly executed through Dettol India’s website (http://dettol.co.in), exposing a vast amount of personal data to potential misuse.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

The revelation has prompted immediate action from cybersecurity experts and authorities. Users affected by the breach are advised to change their passwords and monitor their accounts for suspicious activity.

The potential for identity theft and other cybercrimes is high, given the nature of the data that has been compromised. Dettol India has yet to issue an official statement regarding the breach.

However, experts urge the company to conduct a thorough investigation and implement more robust security measures to prevent future incidents.

The incident has also sparked a broader conversation about the need for stronger data protection laws and practices in India. This breach is a stark reminder of the vulnerabilities in the digital age.

As companies increasingly rely on digital platforms to engage with customers, the importance of cybersecurity cannot be overstated.

The Dettol data breach is one of the latest in a series of cyberattacks targeting major corporations, highlighting the need for continuous vigilance and improvement in cybersecurity measures.

The incident serves as a wake-up call for companies and consumers to prioritize data security and remain informed about the potential risks associated with online interactions.

As investigations continue, the focus will be on mitigating the damage and ensuring that such breaches do not recur in the future.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...