City
Epaper

Raj govt fixes website bugs exposing residents’ sensitive Jan Aadhaar info

By IANS | Updated: January 29, 2024 19:25 IST

New Delhi, Jan 29 Rajasthan government has fixed security issues impacting its website related to Jan Aadhaar that ...

Open in App

New Delhi, Jan 29 Rajasthan government has fixed security issues impacting its website related to Jan Aadhaar that exposed millions of residents' personal information and sensitive documents.

Jan Aadhaar is a state programme that provides a single identifier to families and individuals in Rajasthan so that they can access the welfare schemes.

Aadhaar cards, birth and marriage certificates, electricity bills, income statements, and personal information, such as date of birth, gender and father's name, were exposed by the bugs, TechCrunch reported.

The bugs were found by the cybersecurity company CloudDefense.ai security researcher Viktor Markopoulos in the Jan Aadhaar portal in December.

The bugs were resolved last week through an intervention by the Indian Computer Emergency Response Team, or CERT-In, the report mentioned.

"This is to inform you that we have received a response from the concerned authority that the reported vulnerability has been fixed,” the agency was quoted as saying.

According to the researcher, a bug allowed anyone to access personal documents and information if they knew the phone number of the registrant.

The other flaw was causing the server to improperly validate one-time passwords, which allowed sensitive data to be returned.

The state's Jan Aadhaar portal, launched in 2019, clams that it has over 78 million individual registrants and 20 million families. The portal aims to provide "One Number, One Card, One Identity" to the residents of Rajasthan which can be used to access various state government welfare schemes.

Meanwhile, researchers have uncovered a highly-sophisticated cyber-espionage campaign, 'Operation RusticWeb', which the threat actors are using to target various personnel within the Indian government to steal confidential documents.

The campaign, first detected in October 2023, uses Rust-based malware and encrypted PowerShell commands, to exfiltrate confidential documents, according to Seqrite, the enterprise arm of global cybersecurity solutions provider, Quick Heal.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Open in App

Related Stories

InternationalIran's "critical oil hub" Kharg Island comes under attack as US deadline looms

BusinessBusiness Analytics Conclave 2.0 Highlights AI-Driven Future at Manipal University Jaipur

BusinessWorld Health Day 2026: Expert Insights on Building Healthy Foundations for a Brighter Tomorrow

National"Heartiest congratulations to our scientists and engineers": YSRCP President YS Jagan Mohan Reddy on 50 MWe Prototype Fast Breeder Reactor milestone"

Politics"Massive attack on Sikh religion": BJP's Phoolka slams Punjab govt's SGPC Act amendment plan

National Realted Stories

NationalKerala polls: War of words peaks as Revanth Reddy, Vijayan trade barbs in cross-state slugfest

NationalOnly competent authority, not HC can waive penalty on deficient stamp duty: SC

NationalProlonged detention violates liberty: Delhi Court grants bail to Sukesh Chandrashekhar in PMLA case

NationalKerala goes 'dry' before polls as spirit levels meet Election Code

NationalDelhi Assembly security breach: Accused Sarabjit Singh sent to 8-day police custody