Please Contact Us for questions about the acquisition, product support, or account management.here.
Over the weekend, Toyota has announced its second data breach in the past five weeks. The breach affects multiple Toyota subsidiaries, such as Toyota Tokyo Sales Holdings, Tokyo Tokyo Motor, Tokyo Toyopet, Toyota Tokyo Corolla, Nets Toyota Tokyo, Lexus Koishikawa Sales, Jamil Shoji (Lexus Nerima) and Toyota West Tokyo Corolla.
According to Toyota, the servers that the hackers accessed stored up to 3.1 million customers information. Exposed customer information includes names, addresses. date of birth, occupation and other information. Financial details remain secured as they were not stored on the hacked servers. The carmaker said there’s an ongoing investigation to find out if hackers exfiltrated any of the data they had access to.
The first incident took place back in February at its Australian subsidiary. The first attack was more disruptive in nature, bringing down Toyota Australia’s ability to handle sales and deliver new cars, and has been attributed by some industry experts to APT32 (OceanLotus), a Vietnamese cyber-espionage unit with a known focus on the automotive industry. Experts suggested that APT32 hackers might have targeted Toyota’s Australian branch as a way to get into Toyota’s more secure central network in Japan. The company has said they would start an internal audit of its IT systems following the attack on its Australian branch, and this second breach leads more people to believe the APT32 theories.
For more information on how to make sure your company is secured, contact us today!