Close Menu
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
What's Hot

EarnIn launches Early Pay for paychecks | PaymentsSource

March 21, 2025

How to Retire Like an Adult: An 11-Point Checklist for Responsible Freedom

March 21, 2025

How Trump’s Chaos Is Exacerbating The Financial Woes Of Colleges

March 21, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
InCapital Direct
Subscribe
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
InCapital Direct
Home»Banking»Unsecured database exposes 240k records of Willow customers
Banking

Unsecured database exposes 240k records of Willow customers

January 21, 2025No Comments3 Mins Read
Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
Unsecured database exposes 240k records of Willow customers
Share
Facebook Twitter LinkedIn Pinterest Email

Willow Pay, a fintech that lets consumers split bills into four weekly payments, had its customers’ names, addresses and copies of their bills exposed by an unsecured database recently discovered by a security researcher.

The researcher, Jeremiah Fowler, said the database included 241,970 records, including bills, mailing lists, account inconsistencies, repayment schedules and other information.

It is unclear whether the database belongs to Willow, a third party contracted by Willow or some other entity. It is also unclear whether any unauthorized parties breached the database before Fowler discovered it. Redacted documents published by Fowler indicated Willow was the original source of the documents, which included repayment receipts sent by Willow and Willow account details.

Willow did not respond to American Banker’s request for comment. Fowler said the fintech also did not respond to him when he notified the company of the exposed database.

The database included a wide range of documents. One redacted screenshot Fowler posted appeared to show a phone bill that included calls and text messages to and from a customer’s phone account. Another document was a spreadsheet containing the details of 56,864 individuals showing whether they were active customers, prospects or blocked accounts.

None of the sampling of records Fowler reviewed and publicly disclosed appeared to include Social Security numbers, drivers’ license numbers or other governmental identification data, which could be used for identity theft.

Despite the apparent lack of identifying information, the public exposure of the database presents both a privacy and security threat to the consumers whose data appears in the records. Threat actors often use non-identifying information in spearphishing attacks, in which they use specific knowledge of a potential victim to intimidate them or impersonate a trusted entity, such as the utility that billed them.

See also  Trump should act quickly on financial regulation and housing

Fowler has documented other examples of unsecured databases maintained by financial services companies. In 2023, he discovered a database associated with business banking fintech NorthOne that contained more than 1 million names, physical addresses and phone numbers of consumers and business owners.

Locating unsecured, public databases containing personal records is a common method of accessing data without authorization. Companies expose these databases by failing to encrypt or password protect the records — sometimes the result of insecure default settings.

Fowler did not publicly disclose how he found the database of Willow customer data. Security researchers and threat actors have various methods and tools for discovering these databases, such as Google dorking, which is a technique that involves using specific search operators to search for files that tend to appear in data breaches.

For example, a researcher or threat actor might use search terms such as “filetype:pdf” to specify that the Google results should be limited to PDF files. They might also use the “intitle:” operator to specify words that might appear in the title of the webpage, such as “passwords.”

Source link

240k Customers database exposes records unsecured Willow
Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
Previous ArticleStudent loan relief most at risk under Trump, experts say
Next Article Republicans May End Student Loan Forgiveness, Healthcare Subsidies In Tax Cut Bill

Related Posts

EarnIn launches Early Pay for paychecks | PaymentsSource

March 21, 2025

Available balance vs. current balance: What’s the difference?

March 21, 2025

Fed’s Waller sees ‘no evidence’ of reserve shortage

March 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

The S&P 500 is up nearly 30% in 2024. Don’t expect it to continue

December 6, 2024

Claim Free Cadbury chocolate For Someone You Love

November 11, 2024

Cost Cutting Strategies to Save Money and Grow Your Finances

October 24, 2024
Ads Banner

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

Stay informed with our finance blog! Get expert insights, money management tips, investment strategies, and the latest financial news to help you make smart financial decisions.

We're social. Connect with us:

Facebook X (Twitter) Instagram YouTube
Top Insights

EarnIn launches Early Pay for paychecks | PaymentsSource

March 21, 2025

How to Retire Like an Adult: An 11-Point Checklist for Responsible Freedom

March 21, 2025

How Trump’s Chaos Is Exacerbating The Financial Woes Of Colleges

March 21, 2025
Get Informed

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

© 2025 incapitaldirect.com - All rights reserved.
  • Contact
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.