Zdnet reports major security breach of the aadhaar database – medianama data recovery boston ma

ZDNet, a business and technology website has reported a new and serious security breach of the aadhaar database. The data leak associated with an incorrectly secured API endpoint used to authenticate aadhaar numbers by a state-owned utility, allows a malicious hacker to access private information on all aadhaar numbers including, bank linked with aadhaar and what services the aadhaar number has been linked to.

The breach was identified over a month ago by karan saini, a new delhi-based security researcher. ZDNet attempted to contact UIDAI for reporting the vulnerability on email, phone and even twitter but received no response. They then contacted the indian consulate in new york and after providing extensive information on the nature of the breach, still saw no action to secure it.Aadhaar database


they informed the consul that they could be publishing the story on friday and requested a comment from the indian government, but received no reply for their last email. They published as notified, but there has been no action on the part of the UIDAI to secure the breach even after it has been reported.

“A data leak on a system run by a state-owned utility company can allow anyone to download private information on all aadhaar holders, exposing their names, their unique 12-digit identity numbers, and information about services they are connected to, such as their bank details and other private information.”

“when saini ran a handful of aadhaar numbers (from friends who gave him permission) through the endpoint, the server’s response included the aadhaar holder’s full name and their consumer number — a unique customer number used by that utility provider.Security breach the response also reveals information on connected bank accounts, said saini. Screenshots seen by zdnet reveal details about which bank that person uses — though, no other banking information was returned.”

Whether the complete demographic data is returned is not known, nor is it known whether information on other services or details of bank account are revealed.

As of now, they have withheld crucial information about the security breach, including the names of the utility provider and the aadhaar API endpoint, as the breach is still live.

The nature of the breach has unnerving similarities to the vulnerabilities elliot alderson (pseudonym) reported about the maadhaar app (he had called that a “school project” in terms of quality of coding).Aadhaar numbers this vulnerability too has very similar problems. Incorrectly secured access, hardcoded access token which, when decoded reads “INDAADHAARSECURESTATUS,” (remember the hardcoded string “123456789” and infamous salt from alderson’s exposes – “bettybotterhadsomebitterbutter-@”?). Any person who has the access token can query the aadhaar database.

There is no rate limiting in place – a concern alderson had brought up about the maadhaar app as well as other security researchers had brought up about the tribune data breach report, which too could potentially replicate the entire database by simply manipulating the url and scraping data. This potentially allows a malicious hacker to cycle through all possible aadhaar numbers (trillions) and download details of the numbers for which aadhaar is present. (medianama note: something like this can be done using a pretty basic scraper script that cycles through numbers and enters responses into a database, allowing the complete aadhaar demographic database to be replicated by third parties)

bank accounts

When saini ran a handful of aadhaar numbers (from friends who gave him permission) through the endpoint, the server’s response included the aadhaar holder’s full name and their consumer number — a unique customer number used by that utility provider. The response also reveals information on connected bank accounts, said saini. Screenshots seen by zdnet reveal details about which bank that person uses — though, no other banking information was returned.

This is similar to the information available by entering “*99*99*1#” from your mobile phone followed by any aadhaar number to get the information on which bank the aadhaar is linked to. This is apparently a feature and not bug.Security breach the UIDAI does not consider this to be sensitive information about a person – thought it can easily be used for phishing.

As zdnet points out, this directly contradicts repeated claims by the UIDAI on social media as well as in the supreme court that the aadhaar database does not store any information about bank accounts or other details.

Predictably, the UIDAI has denied that there is a security breach, as per the news service ANI. “UIDAI refuted reports in sections of media sourced from news website which quoted a man purportedly claiming to be a security researcher that a state-owned utility company has vulnerability which can be used to access a huge amount of aadhaar data including banking details. There is no truth in this story as there has been absolutely no breach of UIDAI’s aadhaar database.Bank accounts aadhaar remains safe and secure.” medianama’s take

Whether through this security issue or others not yet known, but the likelihood of the aadhaar database being replicated by malicious hackers for misuse or sale on the black market is undeniable. At this point, we don’t even consider it a risk so much as near guarantee. This is further borne out by dr. Ajay pandey, CEO of UIDAI’s statement in the supreme court that there are more than 4 crore successful authentications per day! Unless every thirtieth person with an aadhaar authenticates them daily (not counting the extensive reports of failures, aadhaars of infants and children, dead people, undeliverable aadhaars and so on), this number is suspicious and indicates at least some bulk authentication activity, which the UIDAI should have been able to catch and identify given their claims of audit trails.Security breach however, a few malicious scripts scraping the database would explain that number easily.

Prima facie, this security breach appears to return less data than the tribune breach that returned full demographic profile. It is not known whether the API can be used to access more information.

This also highlights repeated concerns raised about a lack of a proper security issue reporting system for this sensitive a project. Not just are there no proper bug reporting channels direct to developers, official emails and phone numbers are not attended to promptly for security issues either. Twitter dms is hardly an appropriate method of reporting sensitive data.Bank accounts the UIDAI’s inappropriate use of twitter dms has also been highlighted at other times, when people are encouraged to message their aadhaar details to the UIDAI if they have issues. Twitter dms are not separate and the account is often accessed from an mobile phone, meaning that the sensitive data then gets accessed from yet another platform with a large number of spywares and malwares available for it. Recent posts by those using the facebook app on their phone showed that facebook had a record of all the phone calls people had made in the last year – without using the facebook app or having any connection to facebook whatsoever. Arelessly applied permissions allow considerable levels of snooping on a phone.Bank accounts several aadhaar apps themselves have extremely dangerous levels of permissions requested from a security perspective.

Repeated security issues revealing poor coding standards is a serious issue. Aadhaar code is not available in the public domain, though various people have claimed at various times that it is open-source. What little we discover from the code comes from such reports and so far, we have seen very elementary and serious issues plaguing the project that secures the sensitive information of an entire country including uncontrolled access to the database by creation of accounts by unauthorized people (as seen in the tribune data breach story), lack of knowledge or lack of seriousness about secure coding practices like adequate randomization, hardcoded strings making it really easy for malicious hackers to access information, lack of rate limiting allowing someone with unauthorized access, unlimited access as well, and so on.Security breach

banner