KiranaPro cyberattack wipes out app code and user data, shocks quick commerce sector

Quick commerce startup KiranaPro suffers a devastating cyberattack, resulting in deletion of app code and exposure of sensitive user data via AWS and GitHub breach.
KiranaPro, the voice-enabled AI-powered grocery delivery platform, has fallen victim to a severe cyberattack that wiped out its application code and compromised personal user data. The breach has halted order processing on the platform, exposing glaring vulnerabilities in cloud security and account access control.
According to reports, the attack was traced to unauthorized access through the account of a former employee — a stark reminder of the growing insider threat risks in the digital ecosystem.
- KiranaPro’s entire app codebase and sensitive customer data were deleted in the attack.
- Attackers gained root-level access to the company’s Amazon Web Services (AWS) and GitHub accounts.
- User data exposed includes names, mailing addresses, and payment information.
- The attack likely occurred between May 24 and May 25, identified during routine AWS login activity.
- Despite having Google Authenticator-based MFA, the AWS root account was compromised.
- All EC2 instances were deleted, leaving the company unable to access core infrastructure or logs.
- GitHub and AWS teams have been approached to help trace IPs and recover access.
- The breach is suspected to have been carried out through a former employee’s credentials.
- Legal action is being initiated against ex-employees who failed to return credential access post-exit.
- KiranaPro had ambitions to onboard 100 million users and 1 million kirana stores via ONDC.
The KiranaPro breach is a critical wake-up call for startups relying heavily on cloud platforms. It highlights the need for stronger identity and access management (IAM), robust offboarding processes, and zero-trust security practices. As cyberattacks grow more sophisticated, organizations must proactively monitor internal and external threats while ensuring system resilience, backup protocols, and log retention — before it’s too late.
- Other (42)
- Ransomware (148)
- Events and News (27)
- Features (45)
- Security (473)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (45)
- Malware Alerts (218)
- Cyber Attack (264)
- Data Backup (11)
- Data Breach (103)
- Phishing (158)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (57)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (5)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (12)
- Impersonation phishing (1)
- DDoS (6)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)