According to the investigation, an attacker illegally leaked the BigBasket user records that hold the personal information and other confidential data that was related to the hacker’s forum. BigBasket is a popular Indian online grocery organization that permits people to shop online food and deliver it to their homes.
However, this morning a well-known seller named Shiny Hunters published a database on the hacker forum for free and claiming that the data was associated with BigBasket, also in November 2020, the organization confirmed the data breach after the hacker gang ShinyHunter published and sell the stolen data in private forums.

The organization also filed a case and inform all the legal authorities and cybercrime police, but the investigators told the company to not leak any details or clues regarding the case it may harm the investigation.
Meanwhile, the same attacker group Shiny Hunter released the whole database of BigBasket for free which includes around 20 million user records. The leaked database contains a customer email address, customer information, SHA1 hashed, passwords, phone numbers, addresses, and another confidential database.

The experts said that the password is in hashed form using the SHA1 algorithm, but the attacker claimed that they were able to crack 2 million passwords listed and another forum member claimed that around 700k of the customers are using the same password for their accounts.

Whereas, the attacker gang who driven this entire attack was also responsible for data breaches that include, TeeSpring, Minted, Chatbooks. Tokopedia, Dave, Promo, Mathway, and multiple others.
What Prevention Did the Customers Take?
According to the experts, multiple records leaked and the attackers claiming data is matched. Therefore, customers have to assume that their information is also leaked in the data breach and they have to update all the passwords they used in BigBasket or any other site to avoid unwanted access.
However, the customer was also advised to not download any attachment and click on any malicious like before verifying it. Because the hackers may use their personal information to execute the attack.