Monday, April 28, 2025
HomeData BreachAuto Tracking Company Sever Misconfiguration Leaks Over a Half Million Personal Records...

Auto Tracking Company Sever Misconfiguration Leaks Over a Half Million Personal Records Online

Published on

SIEM as a Service

Follow Us on Google News

A New Discovered SVR Tracking Company Sever Repository Misconfiguration Leaks the Secret Information of vehicle recovery device and monitoring company SVR Tracking (stolen vehicle records) which Discovered from a misconfigured Amazon AWS S3 bucket.

SVR Tracking Providing service enables lot owners to locate and recover their vehicles with live, real-time tracking and provides stop verification.

Sever Misconfiguration may cause Biggest Impact that will Lead to Expose the Tons of Data from the Network into Public.

- Advertisement - Google News

This Publically Available SVR Tracking Owns Repository contains customers and re-seller network and also the physical device that is attached to the cars.

The repository exposed over a half of a million records with logins / passwords, emails, VIN (vehicle identification number), IMEI numbers of GPS devices and other data that is collected on their devices, customers and auto dealerships. Interestingly, exposed database also contained information where exactly in the car the tracking unit was hidden.

Also Read:   CCleaner Got Hacked & Used For Distributing Malware that Infected 2 Million Users

What all are the Information Misconfiguration Leaks

A Repository Contains Tons of Personal Information with a Backup Folder called “accounts” contained 540,642 ID numbers, account information that included many plate & Pin numbers, emails, hashed passwords, IMEI numbers and more.

This Leakage 116 GB of Hourly Backups ,5 GB of Daily Backups from 2017, 339 documents called “logs” that contained data from a wider date range of 2015-2017 UpdateAllVehicleImages, SynchVehicleStatus, maintenance records.

Also Document with information on the 427 dealerships that use their tracking information, 339 documents called “logs” that contained data from a wider date range of 2015-2017 UpdateAllVehicleImages, SynchVehicleStatus, maintenance records.

Miscofiguration Leaks

This SVR Monitoring Software Provide some Advance Future to Monitors the Every Activities of the Car Driver including the Place that he Visited with Pin Pointed Map and also anyone with login using credentials about the top stops or locations where the vehicle has been.

This Software has very Flexible to access with any Internet Connected Devices such as desktop, laptop, mobile phone or tablet.

Kromtech Security Center has Discovered & Reported This Vulnerability Disclosed report to SVR Tracking Company and the Company has been  Secured its MisConfigured  Sever.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok's user database, allegedly...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...