Popular online bill paying site leaks data of thousands of users

Data leak
(Image credit: Shutterstock)

  • Security researcher finds large unsecured online database belonging to Willow Pays
  • The database contained plenty of sensitive customer information
  • It is now locked down, but users should still be cautious

Bill payment platform Willow Pays kept a huge database full of sensitive customer information unprotected online available to anyone who knew where to look, an expert has claimed.

Researcher Jeremiah Fowler, known for hunting down misconfigured and non-password-protected databases on the internet, revealed he recently discovered a database containing more than 240,000 records.

“There were folders inside the database indicating bills, mailing lists, account inconsistencies, repayment schedules, screenshots, settings, and snapshots,” he said. “In a limited sampling of the exposed documents, I saw records that included names, email addresses, credit limits, and other internal information. One single spreadsheet document contained the details of 56,864 individuals, indicating if they were prospects, active customers, or blocked accounts.”

Missing details

Soon after, Fowler was able to attribute the database to Willow Pays, a financial service which helps users manage their bills by paying them upfront. The service allows users to repay the amount in four interest-free installments, making it easier to handle expenses. This service also supports building credit by ensuring timely repayments.

Fowler reached out to Willow Pays, which locked down the database soon after. However, the company did not reply to his emails, and did not say if it manages the database in-house, or if the job was outsourced to a third-party. Furthermore, we don’t know for how long the database remained unlocked, or if any malicious actors accessed it before Fowler did.

Misconfigured databases remain one of the most common causes of data leaks and spills on the internet. Many security researchers are warning that companies do not properly understand the shared security model of most cloud service providers these days, and that they mistakenly place too much trust on them, instead of protecting their assets themselves.

Via Website Planet

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
A digital themed isometric showing a neon padlock in the foreground, and a technological diagram of a processor logic board in the background.
A top online gift card store may have exposed private data on hundreds of thousands of users
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
This widely-used instant loan app leaks nearly 30 million files of user data
Data Breach
Thousands of healthcare records exposed online, including private patient information
Data leak
Top collectibles site leaks personal data of nearly a million users
Data leak
AI development service Builder.ai potentially exposed over 1TB of user data
healthcare
Over a million clinical records exposed in data breach
Latest in Security
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Data leak
Top collectibles site leaks personal data of nearly a million users
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in News
Wonka poster
Netflix cooks up sweet new reality TV series based on Charlie and the Chocolate Factory, and it's a dream come true for me
Citroen 2CV
The retro EV resurgence is in full swing, as Citroen confirms the iconic 2CV will return with batteries
Hugging Snap
This AI app claims it can see what I'm looking at – which it mostly can
Apple iPhone 16 Pro Max REVIEW
The latest batch of leaked iPhone 17 dummy units appear to show where glass meets metal on the new designs
Hornet swings their weapon in mid air
Hollow Knight: Silksong could potentially launch this year and I reckon it could be a great game for an Xbox handheld
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average