Techno

Huge data leak exposes 14 million customer shipping records

There is no industry safe from data violations. During the past few months alone, we have seen security incidents hitting almost every sector, including health care, financing and technology. Now, the shipping industry has joined the list, with a major global charger that works with Amazon, EBay and Shopify displays 14 million records.

Matte the clay was more, the open condition was found in December during the peak of international shipping when people send and receive gifts all over the world. The researchers returned it to the unprotected AWS bucket.

Stay protected and enlightened! Get security alerts and expert technology advice – Subscribe to the Cyberguy report now

Amazon boxes with labels on top. (Cyberguy “Knutsson)

What you need to know

Hipshipper, a charging platform used by sellers on EBY, Shopify and Amazon, millions of charging stickers accidentally with customer information. Researchers in Cybernews The open data was found in December 2024, but it was not fixed until January, which means that it was open for at least a month. Hipshipper helps people to charge packages to more than 150 countries, providing free tracking, insurance and easy returns. Open shipping stickers are important because they separate what is inside the packages and where they are supposed to go.

However, the AWS bucket is not protected with more than 14.3 million records, especially labels and customs models. “Electronic criminals can use the leaked data to carry out fraud and hunting attacks. For example, criminals may demonstrate that they are reliable and send fake messages using specific request details to deceive people in sharing personal or financial information,” said researchers from Cybernews.

Huge data leakage reveals 14 million customer shipping records

Employees of the shipping facility. (Cyberguy “Knutsson)

Hidden costs for free applications: your personal information

What data leaked?

Researchers believe that the open bucket contains sensitive information about buyers, including their full names, home addresses, phone numbers and demand details such as postal dates and parcel information. Although there is no direct evidence that electronic Hungarians have reached the open data, millions of harmful actors use automatic robots to search on the Internet for a similar leak, hoping to find data that they can use for harmful purposes.

These criminals can take advantage of the information that was leaked to launch Fraud operations and Hunting attacks. For example, they may demonstrate that they are reliable companies and send fake messages that use the specific demand details to pressure people to urgently verify personal or financial information. Unfortunately, retail companies are a major target for infiltrators, and relying on large -ranging companies does not always protect your information. Recent violations that include companies such as Grubhuband Mizono and hot address It has shown that even adult retailers can suffer from major security lapses.

Huge data leakage reveals 14 million customer shipping records

Explanation of the infiltrators at work. (Cyberguy “Knutsson)

From Tiktok to a problem: How can your online data be weapons against you

7 ways you can protect yourself after breaking the data like this

1) Beware of attempts to hunt and use a strong antivirus program: After data breach, fraudsters often use stolen data to formulate hunting messages. These can come via email, text messages, or phone calls, and pretend to be from reliable companies. Be very careful about unwanted messages with links requesting personal or financial details, even if they refer to modern requests or transactions. The best way to protect yourself from harmful links is to install the antivirus program on all your devices. This protection can also be alerted to relieving emails and fraud on Ransomwari, and maintaining your personal information and digital assets. Get my choices for the best winners to protect antivirus 2025 for Windows, Mac, Android and iOS devices.

2) Watch out for snail: While many security threats occur online, material mail can also be a target. With home addresses exposed to data leakage, criminals may send fraudulent messages or fake bills to deceive you to provide more personal information or pay payments. If you receive a suspicious mail, avoid responding and inform him of the company you claim to be.

3) Investing in the protection of identity theft: Given the exposure of personal data, such as names, addresses and demand details, the investment in identity steal protection services can provide an additional layer of safety. These services monitor your financial accounts and credit report on any signs of fraudulent activity, and alert you to steal possible identity early. They can also help you freeze bank accounts and credit card accounts to prevent more unauthorized use by criminals. Watch my advice and best choices on how to protect yourself from stealing identity.

4) Empowering bilateral authentication factors on accounts: Empowerment Two Ratification It adds an additional layer of safety to your online accounts. Even if the infiltrators get your login approval data, they will not be able to access your accounts without the second check -out step, such as a code that is sent to your phone or email. This simple step can significantly reduce the risk of unauthorized access to sensitive personal information.

5) Monitor your credit reports regularly: You can request free credit reports from the main credit offices to verify any suspicious activity or unauthorized accounts open in your name.

6) Update your passwords: Change passwords for any accounts that may be affected by rag and use unique strong passwords for each account. Consider using Password Director. This can help you create and store strong and unique passwords for all your accounts.

7) Remove your personal data from public databases: If your personal data is exposed to this breach, it is important to act quickly to reduce the risk of identity theft and fraud by removing your personal information from the web. Check the best data removal choices here.

The massive security defect displays the most popular browsers on Mac

Court Kisa Curt

It is time for the time that every industry took cyberspace seriously. If your work is working online, you are completely responsible for protecting customer data as a technical company, and perhaps more than that, since technology companies usually have stronger guarantees. The fact that Hipshipper has left the storage bucket that contains 14 million unprotected records that talk about sizes about the lack of giving cybersecurity priorities. It is not just Hipshipper. Many companies that deal with technical products are not keen enough to protect their critical documents. This deficiency in basic security highlights a worrying trend across industries.

Do you think companies do enough to protect customer data? Let’s know through our writing in Cyberguy.com/contact.

For more technical advice and security alerts, participated in the free newsletter of Cyberguy Report by going to Cyberguy.com/newsledter.

Ask Kurt a question or tell us about the stories you want to cover.

Follow Court on his social channels:

Answers to the most amazing Cyberguy questions:

New from Court:

Copyright 2025 Cyberguy.com. All rights reserved.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button