Article Details
Scrape Timestamp (UTC): 2024-08-19 20:53:08.192
Original Article Text
Click to Toggle View
Toyota confirms breach after stolen data leaks on hacking forum. Toyota confirmed that its network was breached after a threat actor leaked an archive of 240GB of data stolen from the company's systems on a hacking forum. "We are aware of the situation. The issue is limited in scope and is not a system wide issue," Toyota told BleepingComputer when asked to validate the threat actor's claims. The company added that it's "engaged with those who are impacted and will provide assistance if needed," but has yet to provide information on when it discovered the breach, how the attacker gained access, and how many people had their data exposed in the incident. ZeroSevenGroup (the threat actor who leaked the stolen data) says they breached a U.S. branch and were able to steal 240GB of files with information on Toyota employees and customers, as well as contracts and financial information, They also claim to have collected network infrastructure information, including credentials, using the open-source ADRecon tool that helps extract vast amounts of information from Active Directory environments. "We have hacked a branch in United States to one of the biggest automotive manufacturer in the world (TOYOTA). We are really glad to share the files with you here for free. The data size: 240 GB," the threat actor claims. "Contents: Everything like Contacts, Finance, Customers, Schemes, Employees, Photos, DBs, Network infrastructure, Emails, and a lot of perfect data. We also offer you AD-Recon for all the target network with passwords." While Toyota hasn't shared the date of the breach, BleepingComputer found that the files had been stolen or at least created on December 25, 2022. This date could indicate that the threat actor gained access to a backup server where the data was stored. Last year, Toyota subsidiary Toyota Financial Services (TFS) warned customers in December that their sensitive personal and financial data was exposed in a data breach resulting from a Medusa ransomware attack that impacted the Japanese automaker's European and African divisions in November. Months earlier, in May, Toyota disclosed another data breach and revealed that the car-location information of 2,150,000 customers was exposed for ten years, between November 6, 2013, and April 17, 2023, because of a database misconfiguration in the company's cloud environment. Weeks later, it found two additional misconfigured cloud services leaking Toyota customers' personal information for over seven years. Following these two incidents, Toyota said it implemented an automated system to monitor cloud configurations and database settings in all its environments to prevent such leaks in the future. Multiple Toyota and Lexus sales subsidiaries were also breached in 2019 when attackers stole and leaked what the company described at the time as "up to 3.1 million items of customer information."
Daily Brief Summary
Toyota acknowledged a breach of its systems following the exposure of 240GB of data on a hacking forum.
The leaked information includes details about Toyota employees and customers, financial records, and contracts.
The perpetrator, identified as ZeroSevenGroup, claimed to have accessed the company's U.S. branch using the ADRecon tool to gather extensive information from Active Directory.
Despite the breach, Toyota maintains it is a limited-scope issue, not affecting their systems widely.
Toyota is currently engaging with affected parties to provide necessary assistance, although specific details about the breach's discovery and the extent of exposed personal data remain undisclosed.
Incident dates back to files created or stolen on December 25, 2022, suggesting a possible breach of a backup server.
This event follows several other security incidents involving Toyota, including a ransomware attack and multiple misconfigurations of cloud services in recent years.