Security News > 2023 > December > Nissan is investigating cyberattack and potential data breach
Japanese car maker Nissan is investigating a cyberattack that targeted its systems in Australia and New Zealand, which may have let hackers access personal information.
Details of the attack have not been published but the company informed customers of its Nissan Oceania division of a potential data breach, warning them that there is a risk of scams in the upcoming days.
Nissan Oceania is a regional division of the famous Japanese automaker that covers distribution, marketing, sales, and services in Australia and New Zealand.
A statement from the company has been published on the main page of both "Nissan.com.au" and "Nissan.co.nz" websites and informs that the systems of the Australian and New Zealand Nissan Corporation and Financial Services "Have been subject to a cyber incident."
Because the risk from customer data being compromised is significant, Nissan is warning about potential scams targeting account holders and the possibility of account hijacking.
"While the extent of the incident is still under investigation, Nissan encourages its customers to be vigilant across their accounts, including looking out for any unusual or scam activities." - Nissan.
News URL
Related news
- Yacht retailer MarineMax discloses data breach after cyberattack (source)
- 43 million workers potentially affected in France Travail data breach (source)
- Nissan breach exposed data of 100,000 individuals (source)
- Fujitsu found malware on several systems, confirms data breach (source)
- Fujitsu found malware on IT systems, confirms data breach (source)
- Fujitsu finds malware on company systems, investigates possible data breach (source)
- Week in review: Ivanti fixes RCE vulnerability, Nissan breach affects 100,000 individuals (source)
- OWASP discloses data breach caused by wiki misconfiguration (source)
- AT&T faces lawsuits over data breach affecting 73 million customers (source)
- SurveyLama data breach exposes info of 4.4 million users (source)