Close Menu
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
What's Hot

Stocks making the biggest moves premarket: ULTA, ABNB, GAP, AEO

June 1, 2025

The Road to the “Seven-Figure Club”

May 31, 2025

How to save $1,000 in a month: 10 strategies

May 31, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Smart SpendingSmart Spending
Subscribe
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
Smart SpendingSmart Spending
Home»Banking»Unsecured database exposes 240k records of Willow customers
Banking

Unsecured database exposes 240k records of Willow customers

January 22, 2025No Comments3 Mins Read
Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
Unsecured database exposes 240k records of Willow customers
Share
Facebook Twitter LinkedIn Pinterest Email

Willow Pay, a fintech that lets consumers split bills into four weekly payments, had its customers’ names, addresses and copies of their bills exposed by an unsecured database recently discovered by a security researcher.

The researcher, Jeremiah Fowler, said the database included 241,970 records, including bills, mailing lists, account inconsistencies, repayment schedules and other information.

It is unclear whether the database belongs to Willow, a third party contracted by Willow or some other entity. It is also unclear whether any unauthorized parties breached the database before Fowler discovered it. Redacted documents published by Fowler indicated Willow was the original source of the documents, which included repayment receipts sent by Willow and Willow account details.

Willow did not respond to American Banker’s request for comment. Fowler said the fintech also did not respond to him when he notified the company of the exposed database.

The database included a wide range of documents. One redacted screenshot Fowler posted appeared to show a phone bill that included calls and text messages to and from a customer’s phone account. Another document was a spreadsheet containing the details of 56,864 individuals showing whether they were active customers, prospects or blocked accounts.

None of the sampling of records Fowler reviewed and publicly disclosed appeared to include Social Security numbers, drivers’ license numbers or other governmental identification data, which could be used for identity theft.

Despite the apparent lack of identifying information, the public exposure of the database presents both a privacy and security threat to the consumers whose data appears in the records. Threat actors often use non-identifying information in spearphishing attacks, in which they use specific knowledge of a potential victim to intimidate them or impersonate a trusted entity, such as the utility that billed them.

See also  J.D. Power: More than one quarter of bank customers experienced fraud

Fowler has documented other examples of unsecured databases maintained by financial services companies. In 2023, he discovered a database associated with business banking fintech NorthOne that contained more than 1 million names, physical addresses and phone numbers of consumers and business owners.

Locating unsecured, public databases containing personal records is a common method of accessing data without authorization. Companies expose these databases by failing to encrypt or password protect the records — sometimes the result of insecure default settings.

Fowler did not publicly disclose how he found the database of Willow customer data. Security researchers and threat actors have various methods and tools for discovering these databases, such as Google dorking, which is a technique that involves using specific search operators to search for files that tend to appear in data breaches.

For example, a researcher or threat actor might use search terms such as “filetype:pdf” to specify that the Google results should be limited to PDF files. They might also use the “intitle:” operator to specify words that might appear in the title of the webpage, such as “passwords.”

Source link

240k Customers database exposes records unsecured Willow
Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
Previous ArticleWhat a second Trump administration could mean for your money
Next Article David Einhorn says we have reached the ‘Fartcoin’ stage of the market cycle

Related Posts

How to save $1,000 in a month: 10 strategies

May 31, 2025

Here’s what banks must do to secure open banking data

May 31, 2025

How banks are getting their data ready for open banking

May 31, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

High-yield savings rates today: May 5, 2025 | APYs remain elevated despite a slight decline

May 6, 2025

Small Businesses in Limbo Amid Trump’s Tumultuous Trade War

May 25, 2025

Building financial independence for women through financial literacy

March 29, 2025
Ads Banner

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

Stay informed with our finance blog! Get expert insights, money management tips, investment strategies, and the latest financial news to help you make smart financial decisions.

We're social. Connect with us:

Facebook X (Twitter) Instagram YouTube
Top Insights

Stocks making the biggest moves premarket: ULTA, ABNB, GAP, AEO

June 1, 2025

The Road to the “Seven-Figure Club”

May 31, 2025

How to save $1,000 in a month: 10 strategies

May 31, 2025
Get Informed

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

© 2025 Smartspending.ai - All rights reserved.
  • Contact
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.