Thursday, May 15, 2025
HomeData BreachAuto Tracking Company Sever Misconfiguration Leaks Over a Half Million Personal Records...

Auto Tracking Company Sever Misconfiguration Leaks Over a Half Million Personal Records Online

Published on

SIEM as a Service

Follow Us on Google News

A New Discovered SVR Tracking Company Sever Repository Misconfiguration Leaks the Secret Information of vehicle recovery device and monitoring company SVR Tracking (stolen vehicle records) which Discovered from a misconfigured Amazon AWS S3 bucket.

SVR Tracking Providing service enables lot owners to locate and recover their vehicles with live, real-time tracking and provides stop verification.

Sever Misconfiguration may cause Biggest Impact that will Lead to Expose the Tons of Data from the Network into Public.

- Advertisement - Google News

This Publically Available SVR Tracking Owns Repository contains customers and re-seller network and also the physical device that is attached to the cars.

The repository exposed over a half of a million records with logins / passwords, emails, VIN (vehicle identification number), IMEI numbers of GPS devices and other data that is collected on their devices, customers and auto dealerships. Interestingly, exposed database also contained information where exactly in the car the tracking unit was hidden.

Also Read:   CCleaner Got Hacked & Used For Distributing Malware that Infected 2 Million Users

What all are the Information Misconfiguration Leaks

A Repository Contains Tons of Personal Information with a Backup Folder called “accounts” contained 540,642 ID numbers, account information that included many plate & Pin numbers, emails, hashed passwords, IMEI numbers and more.

This Leakage 116 GB of Hourly Backups ,5 GB of Daily Backups from 2017, 339 documents called “logs” that contained data from a wider date range of 2015-2017 UpdateAllVehicleImages, SynchVehicleStatus, maintenance records.

Also Document with information on the 427 dealerships that use their tracking information, 339 documents called “logs” that contained data from a wider date range of 2015-2017 UpdateAllVehicleImages, SynchVehicleStatus, maintenance records.

Miscofiguration Leaks

This SVR Monitoring Software Provide some Advance Future to Monitors the Every Activities of the Car Driver including the Place that he Visited with Pin Pointed Map and also anyone with login using credentials about the top stops or locations where the vehicle has been.

This Software has very Flexible to access with any Internet Connected Devices such as desktop, laptop, mobile phone or tablet.

Kromtech Security Center has Discovered & Reported This Vulnerability Disclosed report to SVR Tracking Company and the Company has been  Secured its MisConfigured  Sever.

Latest articles

Coinbase Data Breach – Customers Personal Info, Government‑ID & Transaction Data Exposed

Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity...

Inside Turla’s Uroboros Infrastructure and Tactics Revealed

In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed...

CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited

Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...

Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions

The vulnerability management market is projected to reach US$24.08 billion by 2030, with numerous...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Nucor Steel Manufacturer Halts Production After Cyberattack

Nucor Corporation, one of North America’s largest steel producers, has temporarily halted production at...

Customer Data Compromised in Dior Cyber Attack

Luxury fashion house Dior experienced a significant security incident when unauthorized external actors breached...

Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack

British retail giant Marks & Spencer has officially confirmed that customer personal data was...