ESewa Hacked: Data breach or false claims?
At 9:45 pm on Thursday, ESEWA issued "Urgent Information" in the name of the users who logged in to its web. The notification said that the password must be changed while logging in to the web browser after 9 o'clock.
To change the password, it has been made mandatory to keep the token received in SMS or email on the mobile registered in ESewa. Shortly after the company released the information, tweets began to arrive on Twitter from an ID that had just opened, with the aim of verifying the data breach of the service. After seeing such information and details of tweets from ESEWA, many users began to conclude that ESEWA was under cyber attack and eSewa hacked.
eSewa data breached! A hacker releases nearly two dozen eSewa users’ details including passwords
An hour after Isewa released the information, an account was opened on Twitter under the name 'Unknown'. As of this writing, only two tweets have been made.
A screenshot with the email IDs of 34 users, the initials of the password and the amount in the service wallet has been posted along with the tweet. It is a positive step to ask all users to change their passwords.
What the eSewa says about eSewa hacked?
A company source said, "Some customers have used the same ID and password for many websites. Earlier, some of the company's data was made public unauthorisedly.
Read This :Esewa new scheme.Recharge of 500 on RS 11.
For the same reason, the company has requested all customers to change their passwords in the web browser login. As Isewa International Organization for Standardization (ISO) 27001: 2013 certified organization, the technical infrastructure used by the company is quality, safe and world class. Isewa has requested to change its password and rest assured as the customer's data and the amount in the wallet are safe.
|Esewa Data Hacked|
Considering the challenge of cyber security, the company has also requested to keep its password, PIN and other information confidential and change the password from time to time.