Breaking

Nissan Data Breach has exposed customers personal data

Nissan NAM has announced that it has been breached by threat actors and have started sending breach notifications to its customers.

The breach has occurred via a third-party service provider that has exposed customer’s data.

Nissan Data Breach and customer data that was exposed

The Nissan Data Breach was first reported to the Maine Attorney General on Monday, January 16, 2023 where Nissan mentioned that 17,998 customers were affected by the breach.

This third party entity has received customer data from Nissan for their development and testing software for the automaker, which then exposed the data because of poor database configuration.

Source: Maine

Nissan data breach has made the automaker to launch a secured internal investigation. On Sep 26, the company first found evidence of anonymous access to corporate data.

“During our investigation, on September 26, 2022, we determined that this incident likely resulted in the unauthorized access or acquisition of our data, including some personal information belonging to Nissan customers,” said the Nissan Notice. reads the notice.

The Nissan data breach and the data that was compromised include names, dates of birth, NMAC, and more. However, payment details and the social security number weren’t compromised.

As per Nissan the compromised data hasn’t been misused in wild and the automaker is taking all the precautions to notify customers now to avoid data exploitation at later state.

The automaker is offering a one-year membership of identity protection services through Experian.

Nissan Data Breach 2021 affected Git server and exposed it

In Jan 2021, Nissan NAM experienced a similar cyber incident exposing Git server with access credentials, with multiple repositories of the firm becoming public.

This incident had 20GB of data leaks that included mobile apps, market research data, client acquisition information and internal tools data. Nissan and other automakers were found using poor API security practices on their mobile and online platforms that leads to account takeovers and sensitive information leaks.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago