Tuesday, May 28, 2024

Toyota Financial Hack Claimed by Medusa Ransomware

The biggest manufacturer of automobiles, Toyota, has discovered unauthorized activity on systems in a few of its Europe & African services.

The ‘Medusa ransomware gang allegedly took data from Toyota Financial Services.’ The group offered the business ten days to provide the $8 million ransom.

Despite being a relatively new threat actor, the Medusa ransomware gang has already established a reputation for using aggressive tactics. The gang has aimed at numerous establishments, including businesses, governmental bodies, and medical service providers.

If victims refuse to pay the ransom, the Medusa ransomware gang has previously threatened to reveal stolen content, including sensitive information. After victims have paid the ransom, the gang has, in certain instances, even released the stolen data.

The Gang Released Sample Data on Its Leak Site

The Medusa gang made claims on their leak site today, November 16, including screenshots of multiple documents confirming the hack’s authenticity and listed stolen sample data.

The files contain several spreadsheets, financial documents, staff email addresses, and scans of a Serbian passport. One document, in particular, contains un-hashed account passwords and usernames for several types of production and development environments, and much more were all included.

A ransomware group claims to have accessed a vast amount of sensitive data from Germany’s Toyota Financial Services.

“Toyota Motor Corporation is a Japanese multinational automotive manufacturer headquartered in Toyota City, Aichi, Japan,” Medusa’s leak site said. 

“Toyota is one of the largest automobile manufacturers in the world, producing about 10 million vehicles per year. The leaked data is from Toyota Financial Services in Germany. Toyota Deutschland GmbH is an affiliated company held by Toyota Motor Europe (TME) in Brussels/Belgium and located in Köln (Cologne).”

The leak site features a countdown to the full data release date of November 26, which is in ten days. The gang will extend the deadline by one day for US$10,000.

The company took a few systems offline to look into this activity and lower risk. They have also started collaborating with law enforcement. They have begun getting their systems back online in the majority of countries.

“We are working diligently to get systems back online as soon as possible and we regret any inconvenience caused to our customers and business partners. As of now, this incident is limited to Toyota Financial Services Europe & Africa”, the company said.

Cybersecurity analyst Kevin Beaumont pointed out that Toyota systems that are reachable online are susceptible to the “Citrix Bleed” vulnerability, which was disclosed late last month and has already impacted numerous major businesses and government agencies.

Over the past three years, the automaker has had to cope with several cybersecurity breaches. One major one that was revealed in May involved the exposure of data on over 2 million Japanese automobiles for more than ten years.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Website

Latest articles

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...

Hackers Exploit WordPress Plugin to Steal Credit Card Data

Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting...

Google Patches Chrome Zero-Day: Type Confusion in V8 JavaScript

Google has released a patch for a zero-day exploit in its Chrome browser.The...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles