Clicky

Indian Post Office KYC Data Breach Exposes Security Flaws in Digital ID Systems

Sensitive KYC data, including Aadhaar and PAN details, was left exposed due to a security flaw in the Indian Post Office portal.

A woman at a post office counter interacting with an employee. Posters promoting postal services are displayed on the glass window divider. The setting appears to be the Head Post Office in Patiala.

If you’re tired of censorship and surveillance, subscribe to Reclaim The Net.

Another alarming digital ID and KYC data breach has once again exposed the vulnerabilities of digital identity systems, proving why they remain a significant privacy nightmare. A security flaw in the Indian Post Office portal has led to the exposure of thousands of Know Your Customer (KYC) records, demonstrating the ongoing risks of centralized digital ID infrastructure. The breach was caused by an Insecure Direct Object Reference (IDOR) vulnerability, which allowed unauthorized access to sensitive customer data by manipulating the document_id parameter in API requests.

The flaw, discovered by cybersecurity analyst Gokuleswaran, exposed confidential information including Aadhaar numbers, PAN details, usernames, and mobile phone numbers of postal service users. The vulnerability stemmed from a weakness in the portal’s URL structure, enabling direct access to customer records without proper authentication. This breach is particularly alarming given India’s rapid expansion of Aadhaar-based authentication across multiple sectors, amplifying the potential for misuse of exposed data.

This incident highlights the critical privacy and security risks of digital IDs. Leaked Aadhaar and PAN details can be exploited for identity theft, fraud, and targeted phishing attacks. Additionally, it raises major regulatory concerns, as India struggles to enforce its data protection policies while advancing its digital identity programs, such as the AI-powered Central KYC Registry set to launch in 2025.

India’s Computer Emergency Response Team (CERT-In) has acknowledged the security lapse and issued mitigation strategies to address IDOR vulnerabilities. Among its recommendations are the implementation of secure tokens instead of direct URL references and the adoption of routine security assessments. However, such breaches continue to occur despite previous advisories, demonstrating a systemic failure in protecting digital identity systems from exploitation.

Privacy advocates and cybersecurity experts stress the need for a fundamental rethink of digital ID security. Proposed measures include enforcing robust server-side authorization checks, replacing direct document identifiers with randomized tokens, implementing stringent parameter validation, conducting frequent penetration testing, and increasing monitoring of user activity. These safeguards are crucial as India pushes forward with its digital infrastructure, yet this breach serves as another stark reminder of the dangers associated with centralized digital identity repositories.

As India accelerates its digital transformation, this incident further validates concerns that digital ID systems are inherently prone to security lapses. With the country’s identity frameworks serving as a model for other nations—such as Sri Lanka’s adoption of India’s DigiLocker system—this breach reinforces the urgent need to prioritize privacy and security. Digital IDs may continue to be a gateway for widespread data exposure and misuse, endangering the very individuals they are meant to serve.

If you’re tired of censorship and surveillance, subscribe to Reclaim The Net.

Read more

USAID logo overlaid on an illustration of rows of laptops with colorful screens.

USAID’s Media Empire

The halt in USAID funding forces a reckoning on whether so-called “independent” journalism should ever rely on Washington’s wallet.

Share this post

Reclaim The Net Logo

Join the pushback against online censorship, cancel culture, and surveillance.

Already a member? Login.