Personally identifiable information of 16 million users of the swachh.city citizen participation site has been dumped on dark web forums, according to cybersecurity firm CloudSek Credit: AndreyPopov / Getty Images A threat actor going by the name LeakBase has exposed sample data of personally identifiable information (PII) of millions of users of the Swachhata citizen engagement platform, according to cybersecurity firm CloudSek.The Swachhata platform is an initiative of the Swachh Bharat Mission in association with the Ministry of Housing and Urban Affairs. On the swachh.city website, users can post complaints to their respective city administrations. The website also gives monthly ratings of cities in terms of grievances resolved and engineers’ performance. “On Friday, September 23, a sample data was posted on dark web forums which contained personally identifiable information of users of the Swachhata platform. While it doesn’t seem like the whole database is made public, some of it is,” said Rahul Sasi, co-founder and CEO of CloudSek.LeakBase often operates for financial gain and conducts sales on its marketplace forum, leakbase.cc, researchers said. The attackers have not, however, mentioned if the information is for sale, or put any price on the data. “It seems like the information is available for free,” Sasi added. While it is not clear how the attack was conducted, Sasi said it was likely that a web-based security vulnerability or API-based vulnerability was exploited. What Swachhata data was exposed? Personal information such as remail addresses, password hashes, phone numbers, transmitted OTP (one-time password) information, login IP to the platform, MAC addresses from users’ systems, individual user tokens, and browser fingerprint information of approximately 16 million users has been exposed, CloudSek noted. The information is contained in a 1.25GB database hosted on a popular file-hosting platform. If this information falls into the wrong hands, threat actors can glean and harvest more PII information from affected individuals, the researchers noted. LeakBase also offers access to admin panels and servers of most CMSes, which are gained through unauthorized means and are sold for profit, according to the researchers.Potential impact of the Swachhata breachThe breach can be used by malicious actors to, among other things, launch sophisticated ransomware attacks and exfiltrate data, according to CloudSek. This information can be aggregated and sold as leads on cybercrime forums. Social engineering and phishing attempts against affected entities or individuals could also be initiated. As a mitigation process, CloudSek advices users to implement a strong password policy and enable MFA (multifactor authentication) across logins. It also advises that vulnerabilities and exploitable endpoints be patched.Ministry of Housing and Urban Affairs representatives were not immediately available for comment. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe