If you're on Zomato, and if your Zomato is linked to your Facebook account, it's time to change your password. Zomato on Thursday announced on their blog that info of 17 million users - including their user IDs and hashed passwords - have been compromised.
As per the latest update, the data is now being sold on a popular Dark Web marketplace.
According to information shared on Hackeread.com, a user by the name of "nclay" claimed to have hacked Zomato.
"The database includes emails and password hashes of registered Zomato users while the price set for the whole package is USD 1,001.43 (BTC 0.5587). The vendor also shared a trove of sample data to prove that the data is legit," the report said.
"The data was stolen this month and this year in May 2017," the hacker told HackRead.
"The hashed password cannot be converted/decrypted back to plain text - so the sanctity of your password is intact in case you use the same password for other services. But if you are paranoid about security like us, we encourage you to change your password for any other services where you are using the same password."Important note - payment related information on Zomato is stored separately from this (stolen) data in a highly secure PCI Data Security Standard (DSS) compliant vault. No payment information or credit card data has been stolen/leaked.
"As a precaution, we have reset the passwords for all affected users and logged them out of the app and website. Our team is actively scanning all possible breach vectors and closing any gaps in our environment. So far, it looks like an internal (human) security breach - some employeeâ€™s development account got compromised."
Zomato also said that they were working to plug any more security gaps.
"Over the next couple of days and weeks, weâ€™ll be actively working to plug any more security gaps that we find in our systems. Weâ€™ll be further enhancing security measures for all user information stored within our database. A layer of authorisation will be added for internal teams having access to this data to avoid the possibility of any human breach."
(With IANS inputs)