Toyota confirmed that its community was breached after a risk actor leaked an archive of 240GB of knowledge stolen from the corporate’s methods on a hacking discussion board.
“We are aware of the situation. The issue is limited in scope and is not a system wide issue,” Toyota instructed BleepingComputer when requested to validate the risk actor’s claims.
The corporate added that it is “engaged with those who are impacted and will provide assistance if needed,” however has but to offer data on when it found the breach, how the attacker gained entry, and the way many individuals had their information uncovered within the incident.
ZeroSevenGroup (the risk actor who leaked the stolen information) says they breached a U.S. department and had been in a position to steal 240GB of information with data on Toyota workers and prospects, in addition to contracts and monetary data,
In addition they declare to have collected community infrastructure data, together with credentials, utilizing the open-source ADRecon device that helps extract huge quantities of knowledge from Lively Listing environments.
“We have hacked a branch in United States to one of the biggest automotive manufacturer in the world (TOYOTA). We are really glad to share the files with you here for free. The data size: 240 GB,” the risk actor claims.
“Contents: Everything like Contacts, Finance, Customers, Schemes, Employees, Photos, DBs, Network infrastructure, Emails, and a lot of perfect data. We also offer you AD-Recon for all the target network with passwords.”
Whereas Toyota hasn’t shared the date of the breach, BleepingComputer discovered that the information had been stolen or not less than created on December 25, 2022. This date might point out that the risk actor gained entry to a backup server the place the info was saved.
​Final yr, Toyota subsidiary Toyota Monetary Providers (TFS) warned prospects in December that their delicate private and monetary information was uncovered in an information breach ensuing from a Medusa ransomware assault that impacted the Japanese automaker’s European and African divisions in November.
Months earlier, in Could, Toyota disclosed one other information breach and revealed that the car-location data of two,150,000 prospects was uncovered for ten years, between November 6, 2013, and April 17, 2023, due to a database misconfiguration within the firm’s cloud surroundings.
Weeks later, it discovered two further misconfigured cloud providers leaking Toyota prospects’ private data for over seven years.
Following these two incidents, Toyota stated it carried out an automatic system to watch cloud configurations and database settings in all its environments to forestall such leaks sooner or later.
A number of Toyota and Lexus gross sales subsidiaries had been additionally breached in 2019 when attackers stole and leaked what the corporate described on the time as “up to 3.1 million items of customer information.”