Researchers at Cybernews have confirmed that an unprotected MongoDB database tied to IDMerit, a global identity verification provider, exposed roughly 1 billion sensitive identity records spanning 26 countries. More than 203 million of those records belong to U.S. residents, and the trove reportedly included names, home addresses, dates of birth, and national ID numbers.

What Happened

On November 11, 2025, Cybernews researchers discovered a MongoDB instance accessible over the open internet with no password protection. The database was attributed to IDMerit, a KYC vendor that services banks, fintech firms, and other financial institutions using AI-driven identity verification workflows. Anyone aware of the server's location could query the contents directly. Researchers notified IDMerit, and the exposure was closed the following day. There is no public evidence that attackers exfiltrated the data, though automated scanners routinely index exposed MongoDB instances within minutes of them appearing online.

What Was Taken

The exposed dataset contained approximately 1 billion records covering individuals across 26 countries, with the United States, Mexico, the Philippines, Germany, Italy, and France representing the highest volumes. Fields observed by researchers included full names, home addresses, postal codes, dates of birth, national ID numbers (including Social Security numbers for U.S. subjects), phone numbers, email addresses, and gender. Some records carried telecom-related metadata and internal flags that appeared to reference prior breach exposure, suggesting IDMerit enriches its KYC pipeline with third-party breach intelligence.

Why It Matters

KYC providers sit at the trust boundary of the global financial system. A dataset of this composition is not a typical credential dump; it contains precisely the attributes needed to defeat downstream identity verification checks at banks, payment processors, and government services. Synthetic identity fraud, account takeover, and tax refund fraud all become materially easier when an attacker has a verified mapping of name, address, DOB, and national ID. The presence of internal breach flags also raises supply-chain concerns, since IDMerit's customers may have assumed these enrichment fields were never externally visible.

The Attack Technique

No intrusion occurred in the traditional sense. The root cause was a misconfigured MongoDB deployment exposed to the public internet without authentication, a recurring failure mode that has driven large-scale data exposures for nearly a decade. Internet-wide scanners such as Shodan and Censys continuously enumerate open database ports, and opportunistic actors frequently copy or ransom such instances before the owner is aware. The window between exposure and remediation, at least until November 12, 2025, provides ample opportunity for silent collection.

What Organizations Should Do

Sources: 1 billion identity records exposed in ID verification data leak - AOL.com