SELECT LANGUAGE BELOW

Stellantis faces significant breach of third-party data

Stellantis faces significant breach of third-party data

Stellantis Faces Data Breach After Cyber Attack

Stellantis, the automotive giant formed from the merger of PSA Group and Fiat Chrysler in 2021, recently announced a data breach that occurred when an attacker infiltrated a third-party customer service platform in North America. During this breach, customer contact details were exposed, making it part of a troubling trend of cyber attacks targeting cloud CRM systems. Other prominent companies, like Google and Allianz, have also reported similar incidents, where attackers exploited these weaknesses to access names, emails, and phone numbers, potentially launching phishing schemes.

Background on Stellantis

Stellantis is currently one of the largest auto manufacturers globally, ranking fifth in overall revenue. With 14 well-known brands, including Jeep and Dodge, the company operates in over 130 countries. Given its large global footprint, it has become an appealing target for cybercriminals.

In a statement, Stellantis assured that only contact information—like names, emails, and phone numbers—was accessed, ensuring that no sensitive financial or personal data, like Social Security numbers or health records, was compromised. As part of its response, the company has initiated incident protocols, launched an investigation, and alerted both authorities and affected customers. They’re also warning consumers to be wary of phishing attempts arising from the breach.

However, Stellantis hasn’t specified the exact number of customers impacted and has not disclosed which specific fields of contact information were accessed.

Link to ShinyHunters and Broader Attacks

While Stellantis has not confirmed the hacker group responsible, reports suggest a connection to the ShinyHunters extortion campaign. Allegedly, this group has stolen over 18 million records from Stellantis’s Salesforce instances. This incident is part of a larger cyber assault targeting multiple Salesforce customers, affecting numerous companies like Google and Cisco.

The methods employed in these attacks are intricate. Attackers exploit OAuth tokens associated with integrations like SalesLoft’s AI chat tool to delve into Salesforce, extracting valuable information along the way. The FBI recently issued a warning about these Salesforce-related breaches, drawn from various metrics of compromise and encouraging organizations to bolster their defenses. ShinyHunters claims they have compromised around 1.5 billion Salesforce records across approximately 760 companies.

What You Can Do to Protect Yourself

Even if only contact information is leaked, it can still pose risks. Here are several steps to help safeguard your personal information:

1) Remove Personal Data from the Web

Contact details can be harvested and sold on various platforms, making you vulnerable to spam and fraud. Data deletion services can help request the removal of your information from these databases, although no service can guarantee complete data erasure. They monitor and erase personal data from multiple websites, offering some peace of mind.

2) Stay Alert to Phishing Attempts

Be cautious after a breach. Attackers might use authentic contact details to make phishing attempts look legitimate. Always scrutinize unexpected messages from known companies, especially those prompting you to click on links or share sensitive information. Installing antivirus software can provide additional security against malicious attacks.

3) Utilize a Password Manager

If attackers have your email, they might try using your passwords to access accounts elsewhere. Password managers can help generate strong, unique passwords for each account, reducing the chances that one data breach could compromise another account.

4) Enable Two-Factor Authentication (2FA)

Implementing 2FA adds an extra layer of security by requiring a temporary code in addition to your password. This significantly decreases the odds of unauthorized access should your password be stolen.

5) Invest in Identity Theft Protection

Identity theft protection services can alert you to suspicious activity, such as fraudulent applications or unauthorized changes to your records. They can also monitor personal information for any potential misuse.

6) Regularly Review Your Accounts

Monitor your accounts not just with Stellantis but also related services. Checking for unusual activities or changes is crucial after a data breach.

Final Thoughts

This incident highlights that large corporations are also at risk, particularly when utilizing third-party cloud platforms for customer interactions. Organizations must regard these integrations with the same caution they apply to their core systems. As cybersecurity threats continue to evolve, vigilance becomes increasingly necessary.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News