Threat Summary
Category: E-Commerce Data Breach / Financial Credential Exposure
Features: Leaked API tokens, unprotected Kafka broker, exposed transaction streams, long-term merchant vulnerability
Delivery Method: Misconfigured Apache Kafka endpoint (publicly indexed), unsecured data streaming service, continuous transmission of live order data
Threat Actor: Unknown (potential exposure to APT & financially motivated cybercrime groups, including Lazarus cluster overlap)
A catastrophic configuration failure at Dukaan, one of India’s fastest-growing e-commerce platforms and a rival to Shopify, left a live data stream publicly accessible for nearly two years — exposing millions of merchants and customers to the risk of financial theft and identity compromise.
Researchers uncovered an open Apache Kafka broker belonging to Dukaan that continuously broadcasted over 270,000 messages per day, including merchant order data, customer details, and live payment credentials tied to major gateways like Stripe, PayPal, and RazorPay.
The leak, discovered in August 2025, had reportedly been active since August 2023, meaning sensitive merchant credentials and customer records may have been accessible for 24 months before the issue was closed.
With more than 3.5 million merchants and 16 million global users, the potential financial impact of the exposure is staggering — estimated in the hundreds of millions of dollars.
Core Narrative
The exposed Kafka instance allowed unauthenticated public access to a continuous stream of real-time e-commerce events. Unlike static database leaks, this was a live firehose of transactional intelligence — every order, refund, and payment authentication token transmitted in plaintext and visible to anyone who connected.
Data elements identified included:
- Customer names, emails, and phone numbers
- Physical addresses and geolocation metadata
- Order details, images, and product values
- Merchant identifiers and store IDs
- Active payment authentication tokens for Stripe, PayPal, and RazorPay
These tokens alone could have allowed attackers to directly interface with merchant payment processors, enabling fraudulent transactions, unauthorized refunds, and financial siphoning.
Researchers demonstrated that an attacker could issue “trigger orders” to prompt live data generation from the stream, capturing real-time transactions and tokens as they appeared. Over time, such an operation could drain merchant balances incrementally without detection — a hallmark tactic of advanced financial cybercrime.
The discovery underscores how unprotected middleware, such as Kafka brokers, can serve as silent breach vectors. Because the exposure didn’t rely on a perimeter intrusion or malware implant, it bypassed traditional detection systems entirely.
Infrastructure at Risk
- Merchants: More than 3.5 million affected, with potential full compromise of linked payment gateway accounts.
- Consumers: Over 16 million customers exposed to identity theft, targeted phishing, and data profiling.
- Payment Gateways: Ripple effect risk across Stripe, PayPal, and RazorPay ecosystems due to leaked authentication tokens.
- E-Commerce Integrators: Platforms using unmonitored Kafka brokers for data synchronization are now under scrutiny for similar exposures.
Policy / Allied Pressure
India’s Computer Emergency Response Team (CERT-In) was notified on September 9, 2025, and confirmed mitigation by October 8, 2025, but no official public statement has been issued.
The Information Technology (Amendment) Act of 2008 and Digital Personal Data Protection Act (DPDP), 2023 both mandate breach disclosure and protection of personal data. Failure to comply may expose Dukaan to substantial fines and regulatory investigations.
The incident arrives at a time when India’s e-commerce ecosystem is expanding rapidly, and confidence in homegrown platforms like Dukaan had been rising. This breach may damage that trust — especially given the prolonged exposure period and the sensitivity of the credentials leaked.
Vendor Defense / Reliance
Following disclosure, the exposed Kafka endpoint was secured, but as of publication, Dukaan has not issued a public statement.
Cybersecurity analysts note that Kafka brokers must be protected via:
- Strict network segmentation — limiting internal message streams to trusted IPs
- Authentication and TLS encryption — preventing public access and sniffing
- Real-time audit logging and anomaly detection — to catch long-term open streams
- Token isolation and rotation — revoking exposed credentials across all connected payment gateways
Payment partners are expected to initiate forced token invalidation to prevent abuse of exposed keys.
Forecast — 30 Days
Technical: Expect active scanning of public-facing Kafka instances by opportunistic attackers looking for similar misconfigurations.
Operational: Financial forensics may reveal silent incremental theft over the past two years — likely masked as legitimate merchant activity.
Regulatory: Indian CERT may impose data protection enforcement actions under DPDP 2023.
Reputational: Dukaan’s trust standing among global merchants will likely decline, prompting scrutiny across other Indian tech platforms.
TRJ VERDICT
This wasn’t a hack. It was a failure of architecture and oversight.
An open Kafka broker streaming authentication tokens and live payment data is the digital equivalent of broadcasting ATM keys over an unencrypted radio frequency. The two-year exposure period makes it one of the most negligent security lapses in recent memory.
The danger wasn’t hypothetical — it was operational. Attackers could have silently diverted funds, cloned customer data, and rerouted payments without ever breaching a firewall.
In an era when financial data moves faster than the audits meant to protect it, incidents like this prove that the weakest link in cybersecurity isn’t always the attacker — it’s the assumption that configuration equals security.
The digital economy runs on trust, and trust has a shelf life. Dukaan’s may have just expired.
Disclosure Timeline
- Leak Discovered: August 27, 2025
- Initial Disclosure: August 29, 2025
- CERT Contacted: September 9, 2025
- Leak Secured: October 8, 2025
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 2 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed just like the first one.
🔥 Kindle Edition 👉 https://a.co/d/1xlx7J2
🔥 Paperback 👉 https://a.co/d/a7vFHN6
🔥 Hardcover Edition 👉 https://a.co/d/efhu1ON
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified


“An open Kafka broker streaming authentication tokens and live payment data is the digital equivalent of broadcasting ATM keys over an unencrypted radio frequency.”
Wow. That is a huge mistake. Since Dukaan is one of India’s fastest-growing e-commerce platforms, there is obviously money to be made there. The average income, according to one source I checked, is just under 4200 USD per year in India.
https://www.timedoctor.com/blog/average-salary-in-india/#:~:text=Average%20salary%20in%20India%20(2025,commonly%20outsourced%20to%20the%20country.
I would assume that cybercriminals would look for richer countries to attack, and maybe that’s why I haven’t heard of any cyberattacks in India. My assumption is wrong, at least according to my computer AI overview which states:
“India’s cyberspace is the second most targeted in the world, facing increasing threats from ransomware, phishing, and supply chain attacks, with a significant rise in attacks on government institutions. Cybersecurity incidents have increased, particularly in sectors like banking, finance, insurance, healthcare, and hospitality.”
It will be interesting to see how this story pans out.
Thank you for sharing this, John.
You’re absolutely right, Chris — that line about “broadcasting ATM keys over an unencrypted frequency” sums it up perfectly. A public Kafka stream carrying live payment data is the digital equivalent of leaving a vault open with the cameras off.
And the numbers you pulled from that Time Doctor report are spot on — with India’s average annual income hovering around $4,000 USD, cybercriminals aren’t chasing individual wealth there; they’re chasing data velocity. India’s economy has become one of the most digitally active in the world, and that means massive transactional flow — a goldmine for threat actors.
Your AI summary also aligns with the data I’ve been tracking: India now ranks among the top two most targeted nations in cyberspace, right behind the United States. The growth of e-commerce, fintech, and identity-linked infrastructure (like Aadhaar and UPI) has made it a data-dense attack surface.
So, while personal income may be lower, the value per breach is enormous — especially when it involves banking, logistics, or consumer platforms like Dukaan. That’s the real shift: cybercrime today follows where the traffic moves, not where the wealth sits.
Excellent insight as always, Chris — and that link you included reinforces the broader truth: in a global economy, data is the new currency, and exposure is the new income gap. 😎
Thank you for your informative reply, John, and for your encouragement. Your comment saying: “cybercrime today follows where the traffic moves, not where the wealth sits” helps me to understand why India is a target. The population there would certainly allow for lots of traffic.
Thank you for your kind words and I hope you have a great day!