Toyota suffers second data breach in five weeks

Japanese car manufacturer Toyota has suffered a second data breach in the space of five weeks, leading to the data of 3.1m customers being accessed through a malicious attack.
Toyota said that hackers breached its IT systems and gained access to information belonging to several of its sales subsidiaries.
"We take this situation seriously, and will thoroughly implement information security measures at dealers and the entire Toyota Group," said the company.
The nature of the stolen information is yet to be disclosed but Toyota assured its customers, along with Lexus car owners who are also affected, that customer financial information was not part of the breached data set.
Toyota has also not confirmed whether data on the hacked server has been exfiltrated by the hackers but the company has launched an investigation into the incident.
The nature of the data is still not entirely certain, but experts said that because the data relates to the company's sales arms, the data contained by these subsidiaries could lead to more targeted attacks on customers if the data was exfiltrated at all.
"Current and former owners of Toyota vehicles should be concerned about this breach," said Tim Mackey, senior technical evangelist at Synopsys. "With attackers potentially gaining access to sales records, that data provides a perfect profile from which to build a spear phishing attack."
"Moving forward, Toyota customers receiving any communication purporting to be from Toyota should take extra measures to confirm its legitimacy," he added.
"The ability to forensically analyze a data breach is equally as important as preventing it in the first place," said Simon Whitburn, global SVP of cyber security services at Nominet, in a statement sent to IT Pro.
"With so much at risk for customers, businesses cannot afford to play a guessing game about whether data was stolen. Monitoring data patterns at a DNS level is a good place to start, as packets could be analyzed and tracked from source to whatever server they were exfiltrated to."
In late February 2019, Toyota was hit by an "attempted cyber attack", according to a brief company announcement.
At the time, the company believed that no private employee or customer data was acquired through the attack and that the company's own IT department was managing the situation.
Following the news, analysts attributed the initial attack on Toyota to a group labelled 'APT32' or 'OceanLotus Group', a Vietnamese hacking outfit believed to be targeting the auto industry specifically. It's unknown whether the same group could be behind the most recent attack on the car manufacturer.
source itpro
Industry: Cyber Security News

Latest Jobs
-
- Identity Channel Partner Manager | London
- London
- N/A
-
Identity Channel Partner Manager | London Location: South East UK (commutable to London) We are working with a Cyber Security business who are looking for a Channel Partner Manager to drive and grow relationships across their identity ecosystem. Prior experience working within VARs, distributors, vendors or resellers in the identity space is essential. You must have experience working with technologies such as CyberArk, Sailpoint, Okta etc Responsibilities will include, but not be limited to: Build, maintain and develop strong relationships with channel partners. Work closely with partner sales teams to support growth drive sales opportunities. Identify and onboard new partners while strengthening existing partnerships. Act as the key point of contact for all channel-related activity. If you are an experienced channel professional, with experience in the Identity space and are ready for your next challenge, apply today.
-
- Microsoft Security Operations Analyst | Bracknell | SC Clearable | SC-200
- Reading
- N/A
-
Senior SOC Analyst Level 2 / 3. Microsoft Security stack | SC Clearable Location: Hybrid remote | Berkshire SC-200 Senior SOC Analyst Level 2 / 3 to join a specialist Managed Security Services business. You will be responsible for advanced threat hunting / triage, incident response etc with a strong focus on the Microsoft Security Stack. Key Responsibilities: Lead and resolve complex security incidents / escalations Conduct advanced threat hunting using the Microsoft Security Stack. Build, optimise and maintain workbooks, rules, analytics etc. Correlate data across Microsoft 365 Defender, Azure Defender and Sentinel. Perform root cause analysis and post-incident reporting. Aid in mentoring and upskilling Level 1 and 2 SOC analysts. Required Skills & Experience: The ability to achieve UK Security Clearance (SC) - existing clearance ideal. (Sorry no visa applications) Must have current experience working with a SOC environment Key experience must also include, but not be limited to Development and tuning of custom analytic rules. Workbook creation and dashboarding. Automation using Playbooks and SOAR integration. Kusto Query Language (KQL).