CRITICAL SEVERITYEmployment

Tappware Data Breach

Tappware Employee Monitoring Platform Breach (2024): 95K User Records Exposed

Technology company providing identity verification and workflow automation tools.

Verified by ObscureIQ Intelligence

8.0Severity
95KRecords
9Fields
2024Year

ObscureIQ Breach Intelligence Scores
10.0
Breach Risk Index
27
Data Value
25
Market Recency
718
days
Since Breach

Risk Interpretation

High risk of identity theft, document fraud, and impersonation. Identity-verification platforms are especially dangerous because they may hold verified personal and business records.

🎯 Impact & Downstream Threats

The institutional impact on Tappware has been moderate based on publicly available information, with Tappware continuing to operate following the breach. Bangladesh's data-protection legal framework was less developed than EU or U.S. equivalents at the time of the breach, although Bangladesh has been progressing toward more comprehensive personal-data legislation. Civil litigation exposure has been limited based on publicly available information. The reputational impact has concentrated within t

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • Identity verification bypass using name + date of birth combination
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure
  • Employment-based social engineering using job and employer data

🔓 Threat Vectors

Identity verification bypass
Phishing, credential stuffing & account takeover
Name-based social engineering
Profile enrichment
Identity fraud with official bodies
Vishing & authority impersonation
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Targeted harassment & discrimination

📋 Breach Intelligence

EntityTappware
Organization • Global
Breach Date2024-04-01
HIBP Added2024-05-09
Records~95K (94,700 records)
Attack VectorUnknown
Threat ActorUnknown (BCSI discovered)
Data SubjectsUser
Breach PathwayDirect
SourceHave I Been Pwned / ObscureIQ
SensitivityElevated
Breach ID1286.0
StatusConfirmed

📝 Executive Summary

Tappware, a Bangladeshi IT services and identity-verification platform, suffered a data breach on April 23, 2024 when an attacker exfiltrated approximately 34 to 50 gigabytes of data including approximately 2.3 million rows of personal information from Tappware's systems, with the breach data subsequently published on a hacking forum on May 1, 2024. The breach was discovered by the Bangladesh Cyber Security Intelligence (BCSI) during routine monitoring activities. Have I Been Pwned indexed the breach on May 9, 2024 with 94,734 unique email addresses extracted from the broader leak.

The breach affected approximately 95,000 unique email addresses based on records indexed by Have I Been Pwned, with the broader 2.3 million-row dataset covering a substantially larger population of Bangladeshi citizens. Compromised fields included email addresses, full names, dates of birth, gender, religion, job titles, phone numbers, physical addresses, and scans of Bangladeshi national identity (NID) cards. The exposed dataset was structured across multiple files including employee records, profile records, trainee information, user accounts, and worker information files, indicating that Tappware's data covered both individual users and enterprise workforce records collected through identity-verification and worker-management workflows for client organizations.

For affected individuals, the practical risk profile is exceptionally severe due to the inclusion of national identity card scans alongside the full identity profile. The combination of NID card scans, full name, date of birth, address, and phone number provides essentially a complete identity-fraud kit that supports impersonation across Bangladeshi banking, telecommunications, government services, and employment verification systems. The exposure of religious affiliation data creates additional risk of targeted harassment or discrimination in Bangladesh's communal context. Affected individuals should monitor their financial accounts, banking activity, and any identity-verification activity for unauthorized changes; remain alert to phishing or impersonation attempts referencing real personal details; and consider notifying Bangladeshi authorities if any unauthorized identity activity is detected. The persistence of NID-card data in the leaked dataset means the identity-fraud risk extends across an indefinite timeframe because Bangladeshi NID numbers do not change for an individual. The combination of employment data including job titles and employer information also creates risk of employment-based social engineering attacks targeting either the affected individuals or their employers.

🏢 About Tappware

Tappware Solutions Limited is a Bangladeshi information-technology services and software-development company headquartered in Dhaka. The company provides identity verification, electronic Know Your Customer (e-KYC), workflow automation, and digital identity services to enterprise customers in Bangladesh including labor management, employment verification, and worker onboarding workflows. Tappware operates the tappware.com domain and provides software-as-a-service products that aggregate substantial personal-identification data including Bangladeshi national identity card (NID) information used for identity verification of workers and employment applicants. As an identity-verification service provider, Tappware maintains highly sensitive personal data on a substantial population of Bangladeshi citizens including identity scans, demographic profiles, employment records, religious affiliation data, and contact information.

Technology Services Company | Digital identity, e-KYC, and workflow software services | Identity verification and workflow platform | Global
Globaltappware.com

🗂 Why They Hold Your Data

Identity-verification and workflow platforms collect customer identity, e-KYC records, document data, workflow activity, and account-management information across verification and business-process services.

📰 Recent Developments

The breach was discovered by the Bangladesh Cyber Security Intelligence (BCSI) during routine monitoring activities on cybercriminal trading platforms, with BCSI publicly disclosing the incident on May 12, 2024. Bangladesh BCSI recommended that Tappware activate an incident response plan, conduct comprehensive security audits, implement multi-factor authentication, and enhance employee cybersecurity training. The breach was indexed by Have I Been Pwned on May 9, 2024. The case sits within a broader pattern of substantial Bangladeshi personal-data exposures during 2023-2024 including the Bangladeshi government NID server leak that exposed personal information of approximately 50 million Bangladeshi citizens (a separate incident from the Tappware breach), with the cumulative effect creating substantial identity-fraud risk for Bangladeshi citizens. Tappware has not made a substantial public statement regarding the breach.

🔍 Data Points Exposed

9 verified field types:
Dates of birth
Email
Genders
Government issued IDs
Job titles
Names
Phone numbers
Physical addresses
Religions

Exposure Categories

CredentialsGOV ID
LocationPHYS ADDR
EmploymentJOB INFO

Canonical Fields

date_of_birth, email_address, full_name, gender, government_id, job_information:job_title, phone_number, physical_address, religion

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~95K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: Tappware Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Tappware
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

EmploymentEmailPhoneAddressGovernmentIDDOB

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom