Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. IDMerit KYC Data Breach Exposes 1 Billion Records Across 26
IDMerit KYC Data Breach Exposes 1 Billion Records Across 26
NEWS

IDMerit KYC Data Breach Exposes 1 Billion Records Across 26

An unprotected MongoDB instance belonging to identity verification firm IDMerit left over 1 billion personal records — including SSNs, passport numbers,...

Dylan H.

News Desk

February 27, 2026
4 min read

No Password. No Authentication. Just a URL.

IDMerit, a global leader in digital identity verification and Know Your Customer (KYC) compliance, left a MongoDB database containing over 1 billion personal records completely exposed on the internet — with zero authentication required. Anyone with the URL could read, copy, export, or delete the entire contents without credentials.

The Cybernews research team discovered the exposed instance on November 11, 2025. IDMerit secured the database by November 12, but public disclosure didn't arrive until February 18, 2026 — a 99-day gap during which the full scope of exposure remained unknown.


By the Numbers

MetricValue
Total records exposed3+ billion (across multiple databases)
Records with sensitive PII~1 billion
Countries affected26+
US records alone204 million
Total data volume~1 terabyte
Authentication requiredNone
Time exposed (minimum)Unknown — discovered Nov 11, 2025

What Was Exposed

The database contained a comprehensive collection of personally identifiable information (PII) tied to KYC verification processes:

  • Full names and residential addresses with postal codes
  • Dates of birth and national identity numbers (including Social Security Numbers and equivalent identifiers)
  • Telephone numbers, genders, and email addresses
  • Passport and ID document data from 26+ countries
  • Telco metadata including mobile network information — data that could facilitate SIM-swap attacks

The breadth of this data makes it a goldmine for identity theft, social engineering, financial fraud, and targeted phishing campaigns. Unlike typical breaches where passwords can be changed, national ID numbers, dates of birth, and passport details are permanent — victims cannot simply reset their identity.


The KYC Paradox

The irony is sharp: KYC verification exists to prevent fraud by collecting and verifying identity documents. When a KYC provider suffers a breach of this magnitude, the very data collected to protect people becomes the weapon used against them.

Organizations that submitted customer data to IDMerit for identity verification now face the reality that their customers' most sensitive information was sitting in an unprotected database. This raises serious questions about:

  • Vendor due diligence — How are organizations vetting the security practices of their KYC providers?
  • Data minimization — Should KYC providers retain this volume of raw identity data indefinitely?
  • Regulatory compliance — Multiple jurisdictions' data protection laws (GDPR, CCPA, PIPEDA) likely apply given the 26-country scope

Impact Assessment

For Individuals

  • Identity theft risk: SSNs, passport numbers, and full addresses provide everything needed for new account fraud
  • SIM-swap risk: Telco metadata enables targeted SIM-swap attacks for 2FA bypass
  • Phishing risk: Real personal details make social engineering attacks highly convincing
  • Long-term exposure: Unlike passwords, national ID numbers cannot be changed

For Organizations

  • Third-party risk materialized: Any company that used IDMerit for KYC now inherits breach notification obligations
  • Regulatory exposure: Multi-jurisdictional data protection violations across 26+ countries
  • Trust damage: Customers may lose confidence in onboarding processes that require sensitive document submission

What You Should Do

If you've completed KYC verification with any service that may use IDMerit:

  1. Monitor your credit — Place fraud alerts or credit freezes with major bureaus
  2. Watch for phishing — Expect highly targeted attempts using your real personal details
  3. Enable strong 2FA — Use hardware keys or authenticator apps (not SMS) where possible
  4. Review accounts — Check for unauthorized accounts opened in your name
  5. Contact your provider — Ask if they used IDMerit for identity verification

If you're an organization using third-party KYC services:

  1. Audit your vendor's security practices — Request SOC 2 reports, penetration test results, and data handling policies
  2. Minimize data retention — Ensure vendors delete raw identity documents after verification
  3. Implement breach notification plans — Know your obligations across all jurisdictions where customer data is held

Related Reading

  • Ericsson US Discloses Data Breach Affecting Employees and
  • Substack Discloses Data Breach After 100-Day Undetected
  • Japan Airlines Confirms Data Breach Affecting 28,000
#Data Breach#KYC#IDMerit#MongoDB#PII#Identity Theft#Privacy

Related Articles

Ericsson US Discloses Data Breach Affecting Employees and

Ericsson's U.S. subsidiary has disclosed a data breach after attackers hacked a third-party service provider between April 17–22, 2025, exposing names,...

5 min read

3.1 Million Impacted by QualDerm Partners Data Breach

QualDerm Partners, a national dermatology network operating 158 practices across 17 states, disclosed a December 2025 data breach that exposed the medical...

3 min read

Cegedim Santé Breach Exposes 15.8 Million French Healthcare Records Including HIV Status

A cyberattack on French healthcare software vendor Cegedim Santé exposed 15.8 million patient records from 3,800 doctors, with leaked data including...

4 min read
Back to all News