Thursday, March 28, 2024

Toyota Hacked – Hackers Leaked 3.1 Million Customers Sensitive Information Online

Toyota hacked, yes, Toyota major subsidiaries network compromised by unknown hackers and they gained unauthorized access to the network where Toyota stored nearly 3.1 million customers sensitive information.

Toyota Motor Corporation is a Japan-based, world’s second-largest automotive manufacturer who produces more than 10 million vehicles per year.

This security incident affected Japan-based Toyota subsidiaries networks where cyber criminal accessed the server and they may have been leaked 3.1 million customer personal data online.

Compromised Toyota sales subsidiaries including, Toyota Tokyo Sales Holdings Co., Ltd. Tokyo Tokyo Motor Co., Ltd., Tokyo Toyopet Co., Ltd., Toyota Tokyo Corolla Co., Ltd., Nets Toyota Tokyo Co., Ltd. In addition to the five companies, Lexus Koishikawa Sales Co., Ltd., Jamil Shoji Co., Ltd. (Lexus Nerima) and Toyota West Tokyo Corolla Co., Ltd.

The company confirms that the compromised servers didn’t hold any financial data such as credit or debit cards details, but tother information has been leaked online.

Toyota not yet confirmed anything about the way how attackers used to compromise the Toyota network and it’s unclear that who were involved in this cyber attack.

According to Toyota press release, “We have not confirmed the fact that customer information has been leaked at this time, but we will continue to conduct detailed surveys, placing top priority on customer safety and security.”

“We apologize to everyone who has used Toyota and Lexus cars for the great concern.”

“We take this situation seriously, and will thoroughly implement information security measures at dealers and the entire Toyota Group.” Toyota said.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Box Data Leak – Terabytes of Data Exposed from Companies Using cloud based Box Accounts

Citrix Hacked – Terabytes of Sensitive data Stolen by Iranian Hackers

Houzz Suffers a Data Breach, Alerts Users to Change Password

Airbus Data Breach – Hackers Stolen Employee Sensitive & Personal Data

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles