<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Dunzo Archives - ShadowMap</title>
	<atom:link href="https://shadowmap.com/tag/dunzo/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Digital Risk Management - Asset Inventory &#38; Cyber Threat Intelligence - ShadowMap</description>
	<lastBuildDate>Fri, 07 Aug 2020 11:24:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://shadowmap.com/wp-content/uploads/2019/07/favicon-50x50.png</url>
	<title>Dunzo Archives - ShadowMap</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</title>
		<link>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/</link>
					<comments>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 12:55:23 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Dunzo]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1772</guid>

					<description><![CDATA[<p>ShadowMap’s AI &#038; ML based digital risk management platform has discovered a new data breach on the darkweb that impacts 6 million users of the online delivery service, Dunzo. </p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/">Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has discovered a new <a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">data breach on the darkweb</a> that impacts 6 million users of the online delivery service, <a href="https://www.dunzo.com/">Dunzo</a>. Dunzo is an Indian company that provides delivery services in Bengaluru, Delhi, Gurugram, Pune, Chennai, Jaipur, Mumbai and Hyderabad. The company also operates a Bike Taxi service in Gurugram. It is headquartered in Bengaluru, India. In 2017, it was funded by Google.</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>The initial disclosure of the breach was made by Dunzo it self on the 11th of July 2020. As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums for data breaches, we discovered this database being sold on DarkWeb forums around the first week of July 2020.</p>
<p>The forum post claims that the data contains 8,493,681 rows of user data and the hacker has suggested that the initial breach took place in June 2020. On analysing the breach data, we found there were 5,969,986 rows of data published as part of this leak and the breach itself took place around the 20th of June 2020.</p>
<div id="attachment_1775" style="width: 1034px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-1775" class="wp-image-1775 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-1024x313.png" alt="Dunzo Data Breach Published on Dark Web Forums" width="1024" height="313" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-980x299.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-480x147.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1775" class="wp-caption-text">Dunzo Data Breach Published on Dark Web Forums</p></div>
<h2>Inside The Dunzo Data Breach</h2>
<p>The database contains a single table: <strong>Users_DunzoUser</strong></p>
<p><code>id, password, last_login, is_superuser, uuid, first_name, last_name, email, phone, country_code, type, status, device_token, phone_type, phone_make, date_joined, last_updated, secret_key, app_version, registered_on, registered_platform character, send_logistics_pricing, send_logistics_pricing_image_format, last_pricing_version_shared, preferred_mode_of_payment, credit_amount, credit_score, maximum_retries_count, profile_data_updated_on_firebase, merchant_id, permission_role, user_status, flow_version, extra_data_json, city_id, current_runner_task_id, source, first_known_location, last_known_location, referral_code, referred_by_code, advertising_id, device_id, bucket_id</code></p>
<p>The passwords in the database seem to be stored using Django Password Hashes (Salted SHA 256 hash with 20000 iterations), while some users don&#8217;t have a password string in the database since they are most likely using social or OTP based login. In-addition to the email addresses, mobile numbers, IP addresses &amp; password hashes the GPS locations of the users while they installed and last used the application along with details about their phone devices are also available.</p>
<div id="attachment_1818" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1818" class="wp-image-1818 size-large" src="https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-1024x586.png" alt="Dunzo Data Breach" width="1024" height="586" srcset="https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-980x561.png 980w, https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-480x275.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1818" class="wp-caption-text">Dunzo Data Breach</p></div>
<h2>General Recommendations</h2>
<p>Since the password hashes have been leaked, there is a significantly likelihood of password stuffing attacks taking place against various platforms where the same email / mobile and password are being used. In-addition to this, threat actors can use the email addresses to send spam, phishing emails, and launch other online scams.</p>
<p>So, as a rule of thumb:</p>
<ul>
<li>Use strong passwords.</li>
<li>Enable multi-factor authentication for all your online accounts.</li>
<li>Don’t open unsolicited email attachments and links, especially from senders you don’t recognise.</li>
<li>Don’t share OTPs with third-parties.</li>
<li>Review online accounts and financial statements periodically.</li>
<li>Regularly update your apps and any other software you use.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/">Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
