Toyota confirmed that its community was breached after a menace actor leaked an archive of 240GB of knowledge stolen from the corporate’s programs on a hacking discussion board.
“We’re conscious of the state of affairs. The problem is restricted in scope and isn’t a system extensive difficulty,” Toyota instructed BleepingComputer when requested to validate the menace actor’s claims.
The corporate added that it is “engaged with those that are impacted and can present help if wanted,” however has but to offer data on when it found the breach, how the attacker gained entry, and the way many individuals had their information uncovered within the incident.
ZeroSevenGroup (the menace actor who leaked the stolen information) says they breached a U.S. department and have been in a position to steal 240GB of recordsdata with data on Toyota staff and clients, in addition to contracts and monetary data,
Additionally they declare to have collected community infrastructure data, together with credentials, utilizing the open-source ADRecon instrument that helps extract huge quantities of knowledge from Energetic Listing environments.
“We have now hacked a department in United States to one of many greatest automotive producer on this planet (TOYOTA). We’re actually glad to share the recordsdata with you right here free of charge. The info dimension: 240 GB,” the menace actor claims.
“Contents: All the pieces like Contacts, Finance, Prospects, Schemes, Staff, Pictures, DBs, Community infrastructure, Emails, and a whole lot of excellent information. We additionally give you AD-Recon for all of the goal community with passwords.”
Whereas Toyota hasn’t shared the date of the breach, BleepingComputer discovered that the recordsdata had been stolen or not less than created on December 25, 2022. This date might point out that the menace actor gained entry to a backup server the place the info was saved.
Final yr, Toyota subsidiary Toyota Monetary Providers (TFS) warned clients in December that their delicate private and monetary information was uncovered in a data breach ensuing from a Medusa ransomware assault that impacted the Japanese automaker’s European and African divisions in November.
Months earlier, in Might, Toyota disclosed one other data breach and revealed that the car-location data of two,150,000 clients was uncovered for ten years, between November 6, 2013, and April 17, 2023, due to a database misconfiguration within the firm’s cloud setting.
Weeks later, it discovered two further misconfigured cloud companies leaking Toyota clients’ private data for over seven years.
Following these two incidents, Toyota mentioned it applied an automatic system to observe cloud configurations and database settings in all its environments to stop such leaks sooner or later.
A number of Toyota and Lexus gross sales subsidiaries have been additionally breached in 2019 when attackers stole and leaked what the corporate described on the time as “as much as 3.1 million gadgets of buyer data.”