Security Experts Say Need to Secure Aadhaar Ecosystem, Warn About Third-Party Leaks

Security Experts Say Need to Secure Aadhaar Ecosystem, Warn About Third-Party Leaks is a report published in The Economic Times on 26 March 2018. The article summarises how security researchers identified leaks of Aadhaar-related data through third-party systems, the UIDAI response denying breaches of its core database, and expert recommendations about building safer disclosure and remediation processes for the wider Aadhaar ecosystem.

Contents

  1. Article Details
  2. Full Text
  3. Context and Background
  4. External Link

Article Details

📰 Published in:
The Economic Times
✍️ Author:
Nilesh Christopher
📅 Date:
26 March 2018
📄 Type:
News Report
📰 Newspaper Link:
Read Online

Full Text

Synopsis
Security researchers warn that leaks are happening in third-party sites and agency should ensure that its ecosystem adopts measures to keep data safe.

BENGALURU: The public reckoning of data leaks in India's national ID database, Aadhaar is still on hold while reports of data leakage through third-parties keep coming.

While the Unique Identification Authority of India (UIDAI) has maintained that its database is secure and there are no breaches of Aadhaar data from its system, security researchers warn that leaks are happening in third-party sites and it is important for the agency to ensure that its ecosystem adopts measures to keep data safe.

"Securing an entire ecosystem is more important than secure individual databases," said security researcher Srinivas Kodali. Over the weekend, technology publication ZDnet citing an Indian security researcher said that it identified Aadhaar data leaks on a system run by a state-owned utility company Indane that allowed anyone to access sensitive information like a name, Aadhaar number, bank details. The leak was plugged soon after the report appeared.

UIDAI came out with a strong statement denying the breach. "There is no truth in the story as there has been absolutely no breach of UIDAI's Aadhaar database. Aadhaar remains safe and secure," the government agency said.

There have been no reports of any breach in the core database so far. However, it is the third-parties that have acted as weak links.

"The simple parallel that can be drawn is, though Facebook's core database of users information was secure, the data leak happened through third-party developers and organisation like Cambridge Analytica that have allegedly misused it," Kodali said.

"In case of Aadhaar too, the allegations of breaches have not been on ‘Aadhaar database' but rather at insecure government websites and third-parties with API access to the database. In this aspect, the issue in Facebook and Aadhaar is similar. In both the cases there was no breach of database, but it was third parties that acted as the weakest link. In both cases, it was a legitimate means of access through API that was open for abuse," said Sunil Abraham, executive director, Centre for Internet and Society.

UIDAI could take a leaf from Indian Space Research Organisation while handling data breach reports. The state-run space agency put out a note appreciating security researches for their efforts. An email ID to report flaws is more important than summoning people regarding data breaches.

"The fear of criminal prosecution hanging over the heads of ethical hackers would not help us develop a robust and strong security architecture," said Karan Saini, a Delhi-based security researcher who first highlighted the Aadhaar leak at Indane.

"UIDAI is working on a policy to enable security experts to report issues in a legal and safe manner," tweeted Ajay Bhushan Pandey, chief executive of India's Unique Identification Authority (UIDAI), the government department that administers the Aadhaar database. Seven months after the tweet, Pandey's promise of a bug-reporting mechanism has still has not fructified.

Back to Top ⇧

Context and Background

This article appears amid recurring reports of Aadhaar-related data exposures originating at third-party service providers rather than from UIDAI’s core systems. The expert consensus emphasised here is that securing the Aadhaar ecosystem requires more than protecting a central database: it needs robust access controls, secure APIs, clear contractual obligations for third parties, and an accessible, legally safe vulnerability disclosure pathway for security researchers.

Sunil Abraham’s comparison with the Facebook-Cambridge Analytica episode is instructive: legitimate access mechanisms, if misused by downstream actors or poorly secured integrators, can create large privacy failures without a direct compromise of the central database. The piece also highlights an implementation gap — public promises (such as a bug-reporting mechanism) need timely operational follow-through to build trust with security researchers and the public.

For readers tracking Aadhaar policy and cybersecurity in India, the article underscores two linked policy tasks:

📄 This page was created on 11 December 2025. You can view its history on GitHub, preview the fileTip: Press Alt+Shift+G, or inspect the .