(Reuters) – A government audit of India’s flagship payments processor last year found more than 40 security vulnerabilities including several it called “critical” and “high” risk, according to an internal government document seen by Reuters.
The audit, which took place over four months to February 2019, highlighted a lack of encryption of personal data at the National Payments Corporation of India (NPCI) which forms the backbone of the country’s digital payments system and operates the RuPay card network championed by Prime Minister Narendra Modi.
The March 2019 government document cited the storing of 16-digit card numbers and other personal information such as customer names, account numbers and national identity numbers in “plain text” in some databases, leaving the data unprotected if the system was breached. The audit has not previously been reported.
The NPCI said in a statement to Reuters it is regularly audited in the interests of security and senior management reviews all findings, which are then “remediated to (the) satisfaction of the auditors”. This includes the findings cited by Reuters, it said.
India’s National Cyber Security Coordinator, Rajesh Pant, whose office coordinated the audit, also said in a statement to Reuters that “all observations raised in last year’s report have been confirmed as resolved by the NPCI”.
Pant added audits are best practice for the mitigation of cyberattacks and are conducted on a periodic basis by all enterprises.
The audit was undertaken to provide Modi’s National Security Council with an overview of the NPCI’s defences against cyberattacks. Modi’s office and the finance ministry did not respond to a Reuters request for comment.
The audit’s findings underscore the data-security challenges faced by the NPCI which processes billions of dollars daily via services that include inter-bank fund transfers, ATM transactions and digital payments.
In India and beyond, financial institutions are under immense pressure to mount effective defences to protect their customers as the number of malicious cyberattacks grow and hackers become more sophisticated.
Set up in 2008, the NPCI is a not-for-profit company which as of March 2019 counted 56 banks as its shareholders, including the State Bank of India (SBI.NS), Citibank (C.N) and HSBC (HSBA.L).
RuPay, in particular, has been enthusiastically endorsed by Modi who has likened its use to a national duty. It has grown to account for almost two-thirds of nearly 900 million debit and credit cards issued in India as of October, according to NPCI and central bank data.
The audit followed a Reserve Bank of India (RBI) inspection report on the NPCI in July 2017 that found lapses in its internal auditing practices, operational risks and improper whistleblower policies.
There was “lack of awareness of risks and risk culture in the institution,” according to a mostly redacted version of the 37-page report that was obtained by Reuters via the Right to Information Act (RTI) last year.
The 2019 government document about the audit also noted: “There is a strong need for proper governance.”
The RBI conducted another inspection between November and December 2019. A 33-page report on that audit included its assessment of NPCI’s governance and operational and credit risks. But most of the report, also obtained by Reuters via the RTI Act, was redacted by the central bank which cited the need to protect India’s and the NPCI’s economic interests.
The NPCI in its statement did not comment specifically on the RBI reports, but said all observations cited by Reuters were remediated. The RBI did not comment on the reports.
The March 2019 government document said a variety of card numbers were unencrypted within the NPCI database for the country’s network of almost 250,000 ATMs, while unencrypted RuPay card numbers could also be seen in the organisation’s server logs.
It recommended that sensitive data, customer data and personal identity information be “properly encrypted/masked in the database and logs”.
NPCI said in its statement to Reuters that it stores card data in line with standards set by the PCI Security Standards Council, and has been subject to audits authorised by the council. “No non-conformities have been observed and we are fully compliant to these standards,” the statement said.
Other high risk issues in RuPay and other NPCI applications cited by the government audit included so-called “buffer overflow” vulnerability, a memory safety issue that can allow hackers to take advantage of coding mistakes.
Operating systems used by the NPCI were not “up to date” and one of its mail servers had inadequate anti-malware functionality, it also said.
The audit was conducted by a team of 10 to 12 people at NPCI’s Mumbai headquarters and offices in two other cities, a person familiar with the matter said, declining to be identified.