LIVE NEWSROOM · --:-- · May 16, 2026
A LIBRARY FOR SECURITY RESEARCHERS

SBI employee’s data leaked on telegram more than 12,000 employees affected

Post on X LinkedIn
SBI employee’s data leaked on telegram more than 12,000 employees affected

Recently the news has come to know that data of more than 12,000 SBI employees and account holders have leaked through telegram channels which shows that the bank has missed some red flags regarding the attack on the database.

Confidential/sensitive information like a copy of a passbook, Aadhaar card, and voter I’d be leaked. All these data are stored unencrypted which is the biggest mistake of banks and leads to these huge damage to data leakage. Bank will ensure that the hackers/attackers should not be successful even if the data is stolen. And it only happens when all the data stored is encrypted.

Last Friday, on telegram a message from an unknown account with 608 followers come that released a file that contains the account numbers, photo IDs, work IDs, IPs, phone numbers, addresses, names, and a number of other personal details of SBI employees and other customers.

The attacker exploits an unprotected database in which no restrictions are available to access the customer’s financial details like bank balance and recent transactions.

The attacker also leaked more than 4000 employee data like SBI accounts screenshots, Aadhaar cards, and PAN cards openly on a public website which can cause financial damage to those employees and customers.

SBI data leaked image

The cyber security expert, Saumay Srivastava disclose the huge SBI data leak through his efforts towards dark web monitoring. According to him, an attacker attacks the infrastructure by exploiting any active vulnerability by using Ransomware as a service (RaaS) attack to attack active infrastructure.

He also says that still, the banking sector is under the target of attackers which leads to huge/massive damage to confidential/sensitive data of employees and account holders or the bank’s reputation.

He highlights the point that with the help of leaked data, an attacker can access the bank accounts of those clients and employees, can conduct transactions and due to weak security these files are easily accessible for them.

// 02 How SBI and other banks prevent their database from such attacks

  1. Use firewalls, IP-based restrictions, and passwords for authentication.
  2. Encrypt all confidential and sensitive information like employee IDs, passwords, email addresses, contact numbers, etc.
  3. Apply active vulnerability scanners for database and cloud storage that scans all loopholes on time.
  4. Regularly take backup of all sensitive data to prevent data in case of any attack occur.
  5. Always follow vulnerability management guidelines by CERT-IN.
  6. Update the security of the database regularly to prevent it from attacks.
  7. Hide the confidential data of employees and account holders using the robots.txt file, which only can be accessed in the root-level directory.

    TE
    Team Ciphers Security

    Independent cybersecurity desk publishing daily threat intel and research since 2021. Practitioners writing for analysts, defenders, and learners. About us →

    Previous How to Use BillCipher for footprinting target Next How to use OSINT Framework for Footprinting Target

    Latest News

    YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support YARA-X 1.16.0 ships with performance improvements across 10 PRs, constant folding for bitwise ops, configurable mat… Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes Instructure was quietly removed from ShinyHunters' extortion site after the May 12, 2026 deadline — no data dump, n… Costa Rica Joins Have I Been Pwned as the 42nd Government Costa Rica's CSIRT gains free access to Have I Been Pwned's government domain monitoring service, becoming the 42nd… LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures CISA and FBI advisory AA25-141B details LummaC2 MaaS infostealer TTPs targeting critical infrastructure. DOJ seized… MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware Russian-speaking attackers combine Google Ads and Claude.ai shared chats in a ClickFix campaign deploying MacSync S… JDownloader Site Hacked, Installers Swapped with Python RAT Malware JDownloader's website was hacked May 6–7, 2026, replacing Windows and Linux installers with a Python-based RAT. Use… Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics Operation HookedWing has stolen credentials from 500+ organizations in aviation, energy, logistics, and critical in… Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen CVEs in the vm2 Node.js sandbox library — including CVSS 10.0 flaws — allow sandbox escape and RCE. Update …
    Scroll to Top