An identity verification company called IDMerit left a MongoDB database open to the internet with no password. Inside: roughly 3 billion records spanning 26 countries, including 1 billion sensitive KYC records containing national IDs, full names, addresses, phone numbers, dates of birth, and telecom metadata. The United States alone accounted for 203 million exposed records. Mexico had 124 million. The Philippines, 72 million. Germany, Italy, and France each had over 50 million.
The Cybernews research team found the exposed instance on November 11, 2025. IDMerit secured it the next day. No evidence of malicious access has been confirmed, but as researchers noted, automated crawlers operated by threat actors constantly scan for exactly this type of exposed database. If researchers found it, there's a strong probability that someone else did too.
The standard post-breach narrative writes itself here: company failed at basic security hygiene, MongoDB should have been authenticated, lessons learned, move on. But that framing misses the real story.
The real question is: why did IDMerit have 1 billion identity records in the first place?
The Verification Mandate Problem
IDMerit exists because regulations require it to exist. Financial services regulations demand Know Your Customer (KYC) verification. Anti-money laundering (AML) laws require identity confirmation before opening accounts. Age verification laws, now proliferating across US states and internationally, mandate that platforms confirm users are old enough to access certain content. Healthcare, e-commerce, telecommunications, and government services all increasingly require identity verification at the point of access.
Companies subject to these requirements don't typically build verification systems in-house. They outsource to specialized third-party providers like IDMerit, which collects, processes, and stores the identity documents and personal data needed to satisfy regulatory requirements. This is the same third-party risk pattern that I've written about before: organizations push sensitive operations to vendors, and the attack surface follows the data.
The result is a concentration problem. Instead of identity data being distributed across thousands of individual companies (each holding only their own customers' records), it pools into a handful of verification providers that hold records for everyone. IDMerit's database didn't contain the customers of one company. It contained the verified identities of people across 26 countries who interacted with any of IDMerit's clients.
This is the paradox at the center of modern identity verification: the system designed to confirm identity becomes the single largest source of identity theft material.
The Honeypot Factory
IDMerit isn't an isolated case. The pattern is accelerating.
BleepingComputer reported that identity verification laws are directly fueling a new wave of breaches. The Tea app, which verified user ages for compliance purposes, leaked 13,000 personal IDs that were posted publicly online, displaying real addresses on screens across the internet. Discord's verification partner exposed government ID images from users who had submitted documents to appeal age-related account suspensions.
The R Street Institute warned that mandating platforms collect government IDs and face scans creates "valuable honeypots for hackers," citing that over 80% of US companies have experienced a successful hack and the US government itself has suffered 822 breaches affecting nearly 175 million records over nine years. The Government Accountability Office found that 60% of its own cybersecurity recommendations remain unimplemented.
Every new age verification law, every expanded KYC requirement, every mandate that companies confirm identity before granting access creates another database that must be defended. And the data inside these databases isn't email addresses or usernames that can be changed. It's national IDs, passport numbers, facial biometrics, and home addresses. When this data leaks, the damage is permanent.
This is what makes identity verification breaches fundamentally different from credential leaks. When 149 million stolen credentials were exposed earlier this year, affected users could change their passwords. When a billion national IDs and home addresses leak, there's no reset button.
The Architecture Is the Vulnerability
The core problem isn't that IDMerit had a misconfigured database. It's that the entire identity verification model requires centralizing exactly the information that attackers value most.
Think about what a traditional KYC verification flow looks like:
- A user needs to access a service that requires identity verification
- The service sends the user to a third-party verification provider
- The user uploads their government ID, selfie, and personal details
- The provider stores these documents, runs verification checks, and returns a pass/fail result
- The original documents and personal data remain in the provider's database
Step 5 is where the model breaks. The verification is a point-in-time event, but the data persists indefinitely. IDMerit didn't need 1 billion identity records to provide ongoing value. It needed them for a few seconds each to verify identity. The records stayed because that's how the system was designed: collect everything, store everything, hope nothing goes wrong.
This is the same flawed assumption I see across enterprise data security. As I discussed in my analysis of the Fortinet SSO breach, perimeter security fails because it treats the boundary as the primary defense. With identity verification, the equivalent failure is treating access control on the database as the primary defense for data that should never have been stored in raw form.
Verify Without Storing
The technology to solve this problem already exists. Zero-knowledge proofs (ZKPs) allow one party to prove a statement is true without revealing the underlying information. Applied to identity verification, a ZKP can confirm that a user is over 18 without revealing their birthdate. It can confirm that a user holds a valid government ID without transmitting or storing the ID itself.
Decentralized identity systems take this further. Instead of centralizing identity data in a provider's database, verification credentials are held by the individual and presented only at the point of verification. The verifying party receives proof that the credential is valid without ever possessing the raw document. Research indicates that decentralized, proof-based approaches are 96% more resistant to data breaches than traditional centralized storage.
The concept is straightforward: if you never collect the data, it can never be breached.
This isn't theoretical. Self-sovereign identity frameworks are already being deployed in financial services and government applications. The European Union's eIDAS 2.0 regulation is building toward a model where citizens control their own identity wallets. Several countries are piloting decentralized ID systems that let users prove eligibility without surrendering raw documents to third parties.
What Practitioners Should Do Now
If your organization relies on third-party identity verification, the IDMerit breach should trigger an immediate review.
Audit your verification vendors. Understand what data your KYC provider retains, for how long, and how it's protected. If your provider stores raw identity documents indefinitely after verification is complete, that's a red flag. Ask about data retention policies, encryption at rest, and whether they've adopted any privacy-preserving verification methods.
Evaluate zero-knowledge alternatives. ZKP-based KYC solutions are maturing rapidly. If your compliance requirements can be met with a verified attestation rather than a stored copy of a passport, the risk reduction is substantial. The verification result ("this user is over 18" or "this user has a valid US identity") is the thing that matters, not the raw document.
Apply data-centric protection. For identity data that must be retained, tokenization makes the stored records worthless to attackers. This is the same principle I've been working on at Capital One: protect the data itself, not just the systems around it. If a tokenized identity database is exposed, attackers get tokens that can't be reversed into real identities. As I wrote about in my piece on ransomware's shift to data exfiltration, the only defense that works when perimeters fail is making the data itself unusable.
Push for smarter regulation. The current regulatory approach mandates collecting sensitive data without adequately mandating how that data must be protected. Age verification laws, in particular, rarely specify security requirements for the verification providers. They create the obligation to collect identity data without creating proportional obligations to protect it. Security professionals should be vocal about this gap.
The Collection Problem
IDMerit's breach will follow the standard cycle: a few weeks of coverage, a round of credit monitoring offers, and then everyone moves on. But the structural problem that created it, the systematic concentration of identity data in third-party databases mandated by regulation, will continue to grow.
Every new KYC regulation adds another vendor that must store sensitive data. Every age verification law creates another database of government IDs. Every identity mandate expands the attack surface. The question isn't whether the next IDMerit-scale breach will happen. It's how many more will happen before the regulatory model catches up to the reality that the safest identity data is the data you never collect.
The technology to verify without storing exists today. The regulatory frameworks are starting to recognize it. The gap is execution, and every day that gap persists, another billion records sit in databases that don't need to have them.