Data Exposure from Unsecured Cloud Server Unveils Sensitive Banking Information in India
Overview of the Incident
A significant data breach involving an unsecured cloud server has led to the exposure of hundreds of thousands of sensitive banking documents in India. This incident has potentially compromised personal information, including account numbers and contact details, as well as transaction amounts.
Discovery by Cybersecurity Experts
In late August, researchers from the cybersecurity firm UpGuard uncovered a publicly accessible Amazon Web Services (AWS) storage server. This server inadvertently revealed 273,000 PDF documents associated with bank transfers for Indian customers. The exposed files primarily contained transaction forms intended for the National Automated Clearing House (NACH)—an essential framework used by banks in India to facilitate high-volume recurrent transactions such as salaries, loan payments, and utility bills.
Affected Financial Institutions
The exposed data is linked to a minimum of 38 various banks and financial organizations throughout India, underscoring the extensive impact of this breach. Notably, a substantial portion of the exposed documents mentioned Aye Finance, which had recently filed for a $171 million Initial Public Offering (IPO). State Bank of India, a prominent public sector bank, also featured prominently in the file sample examined by the researchers.
Lack of Clarity Around Data Security
The exact reasons behind the data exposure and the lack of necessary security measures remain unclear. Such lapses typically arise from misconfigurations or human errors, a situation that is unfortunately not uncommon in data security.
Despite efforts by UpGuard to mitigate the damage, the responsibility for the breach remains ambiguous. The researchers initially notified Aye Finance through multiple communication channels, including customer service and grievance email addresses. They also informed the National Payments Corporation of India (NPCI), the agency overseeing NACH operations, about the exposed information.
Ongoing Vulnerability and Notification Efforts
Despite being alerted, UpGuard reported that as of early September, the sensitive data remained exposed, with thousands of additional files being added to the server daily. In response, the team reached out to India’s Computer Emergency Response Team (CERT-In), which subsequently helped secure the compromised data.
Responsibility and Accountability Issues
Interestingly, there seems to be a reluctance among the involved parties to accept accountability for the security oversight. Ankur Dahiya, a spokesperson for NPCI, asserted in an email to TechCrunch that the exposed data did not originate from NPCI’s systems. He stated, “A detailed verification and review have confirmed that no data related to NACH mandate information/records from NPCI systems have been exposed or compromised.”
Attempts to reach Aye Finance co-founder and CEO Sanjay Sharma and representatives from the State Bank of India for comment have gone unanswered, leaving the accountability for this significant data breach unresolved.
Conclusion
This incident serves as a critical reminder of the importance of robust data security measures, especially in the financial sector. As organizations continue to leverage cloud technologies, maintaining stringent security protocols is crucial to prevent future breaches that could compromise sensitive personal financial information.



