Toyota Ransomware Attack Exposes Customers Personal Data

Toyota Financial Services (TFS) notifies customers after a data breach that exposed personal and sensitive financial information.

In a limited number of locations, including Toyota Kreditbank GmbH in Germany, Toyota Financial Services Europe & Africa has discovered unauthorized activity on its systems, as it announced on November 16.

“Due to an attack on the systems, unauthorized persons gained access to personal data. Affected customers have now been informed. Toyota Kreditbank’s systems have been gradually restarted since December 1st”, the company said.

Toyota Motor Corporation’s finance division is known as Toyota Financial Services (TFS). As a Toyota subsidiary, it offers a variety of financial services to Toyota dealers and customers all around the world. TFS provides a range of financial goods, such as leases, insurance policies, and auto loans. 

TFS aims to assist Toyota customers with financing their automobiles and to make it easier for customers to buy or lease Toyota cars.

Overview of the Ransomware Attack

Data from Toyota Financial Services was allegedly taken by the ‘Medusa ransomware gang’. The group offered the business ten days to provide the $8 million ransom.

The Medusa gang made claims on their leak site today, November 16, including screenshots of multiple documents confirming the hack’s authenticity and listed stolen sample data.

The files contain several spreadsheets, financial documents, staff email addresses, and scans of a Serbian passport. 

One document, in particular, contains un-hashed account passwords and usernames for several types of production and development environments, and much more were all included.

Medusa gang made claims on their leak site

The leak site features a countdown to the full data release date of November 26, which is in ten days. The gang will extend the deadline by one day for US$10,000.

The company took a few systems offline to look into this activity and lower risk. They have also started collaborating with law enforcement. They have begun getting their systems back online in the majority of countries.

German media source Heise received the Toyota data breach notification that was delivered to German customers.

Threat actors were able to obtain the following information such as:

  • Full names,
  • Residence addresses,
  • Contract information,
  • Lease-purchase details
  • IBAN (International Bank Account Number)
Notifying customers of a data breach

Toyota also reported the security violation to North Rhine-Westphalia’s data protection officer.

Cyber security analyst Kevin Beaumont pointed out that Toyota systems that are reachable online are susceptible to the “Citrix Bleed” vulnerability, which was disclosed late last month and has already impacted numerous major businesses and government agencies.

Recommendation

German customers of Toyota Financial Services are advised to exercise caution and get in touch with their bank to implement extra security measures. They ought to keep an eye out for strange activity and get a current credit report from Schufa.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Google Unveils New Intelligent, Real-Time Protections for Android Users

Google has once again raised the bar for mobile security by introducing two new AI-powered…

5 hours ago

Chinese National Faces 20 Years of Jail Time for Laundering Millions in Crypto

Daren Li, 41, a dual citizen of China and St. Kitts and Nevis, and a…

5 hours ago

Google to Issue CVEs for Critical Cloud Vulnerabilities

Google Cloud has announced a significant step forward in its commitment to transparency and security…

6 hours ago

GitLab Patches Critical Flaws Leads to Unauthorized Access to Kubernetes Cluster

GitLab has rolled out critical security updates to address multiple vulnerabilities in its Community Edition…

8 hours ago

Windows 0-Day Exploited in Wild with Single Right Click

A newly discovered zero-day vulnerability, CVE-2024-43451, has been actively exploited in the wild, targeting Windows systems…

9 hours ago

Automating Identity and Access Management for Modern Enterprises

Keeping track of who has access and managing their permissions has gotten a lot more…

1 day ago