Toyota data breach affects 3.1 million customers.
On March 29, 2019, Toyota Japan revealed that the sales information of 3.1 million customers may have been leaked in a data breach that happened on March 21, 2019. Just five weeks earlier, Toyota Australia revealed that it suffered a cyberattack. It hasn't been established yet if these two incidents are related.
Toyota said that the affected servers contained sales records of customers along with personal details like names, addresses, employment details, and dates of birth, but no credit card information was leaked. The unauthorized access was detected on the systems of Tokyo Sales Holdings, Tokyo Tokyo Motor, Tokyo Toyopet, Toyota Tokyo Corolla, Nets Toyota Tokyo, Lexus Koishikawa Sales, Jamil Shoji (Lexus Nerima), and Toyota West Tokyo Corolla. Toyota has not yet confirmed the extent of the data theft and is still investigating the issue.
On March 29, 2019, Toyota Motor Vietnam also revealed it detected unauthorized access in its network. Some security researchers believe that the Toyota Australia breach was likely associated with a Vietnam-based hacking group known as APT32 and OceanLotus. It appears as though the hacking group is targeting the subsidiaries of Toyota in that region. However, the Toyota Group has not yet confirmed whether the three attacks are related.
Even global giants like Toyota falter when such incidents occur. If you want to avoid such disasters and stay out of the news for the wrong reasons, invest in a comprehensive security information and event management (SIEM) tool. Download ManageEngine Log360 to combat internal and external security attacks.
Here's how ManageEngine can help.
Log360, our comprehensive SIEM solution, can help your organization:
- Ensure integrity of critical data stored in SQL databases with column integrity monitoring. Track changes made to data values, view the old and changed values, and more.
- Identify any unauthorized changes happening on confidential data stored in files and folders. Ensure data integrity with the file integrity monitoring module.
- Detect unauthorized network access attempts with its built-in Structured Threat Information eXpression (STIX/TAXII) feeds processor. Log360 also has a global IP threat database that can instantly detect known malicious traffic passing through the network as well as outbound connections to malicious domains and callback servers. The global IP threat database contains more than 600 million blacklisted IP addresses that are collected from trusted open sources and updated daily.
- Find potential insider threats with the user and entity behavior analytics engine, which creates a baseline of normal activities that are specific to each user and notifies security personnel instantly when there's a deviation from this norm. Rather than using static threshold values, this tool employs a combination of data analytics and machine learning to define dynamic thresholds based on real-world user behavior.
- Detect anomalies in accesses, FTP activities, and logon activities with the UEBA add-on.
- Audit report templates to comply with mandates such as the GDPR, FISMA, PCI DSS, and NBD.
- Obtain important forensic information about incidents. The collected logs can be securely archived to help prove adherence to compliance standards and reduce potential legal penalties during investigations.
- Automatically raise incidents as tickets to the designated administrator in ServiceDesk Plus, JIRA, Zendesk, Kayako, or ServiceNow to create an incident resolution process that's swift and accountable.
Download a free trial of Log360 to see the tool in action for yourself.
Latest Ransomware attacks
Latest Data breach attacks
Latest Email Phishing attacks
Latest DoS and DDoS attacks
Latest Brute force attack
Latest Advanced persistent threat (APT)
Stay In The Know
Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.
Thank you. You will receive weekly cybersecurity news soon!