On March 29, 2019, Toyota Japan revealed that the sales information of 3.1 million customers may have been leaked in a data breach that happened on March 21, 2019. Just five weeks earlier, Toyota Australia revealed that it suffered a cyberattack. It hasn't been established yet if these two incidents are related.
Toyota said that the affected servers contained sales records of customers along with personal details like names, addresses, employment details, and dates of birth, but no credit card information was leaked. The unauthorized access was detected on the systems of Tokyo Sales Holdings, Tokyo Tokyo Motor, Tokyo Toyopet, Toyota Tokyo Corolla, Nets Toyota Tokyo, Lexus Koishikawa Sales, Jamil Shoji (Lexus Nerima), and Toyota West Tokyo Corolla. Toyota has not yet confirmed the extent of the data theft and is still investigating the issue.
On March 29, 2019, Toyota Motor Vietnam also revealed it detected unauthorized access in its network. Some security researchers believe that the Toyota Australia breach was likely associated with a Vietnam-based hacking group known as APT32 and OceanLotus. It appears as though the hacking group is targeting the subsidiaries of Toyota in that region. However, the Toyota Group has not yet confirmed whether the three attacks are related.
Even global giants like Toyota falter when such incidents occur. If you want to avoid such disasters and stay out of the news for the wrong reasons, invest in a comprehensive security information and event management (SIEM) tool. Download ManageEngine Log360 to combat internal and external security attacks.
Log360, our comprehensive SIEM solution, can help your organization:
Download a free trial of Log360 to see the tool in action for yourself.
You will receive weekly cybersecurity news soon!
2022 Zoho Corporation Pvt. Ltd. All rights reserved.