Zoomcar, a well-known car-sharing platform, recently reported that a cyberattack exposed the personal details of approximately 8.4 million users. The information that was accessed includes users’ names, phone numbers, and vehicle registration details.
The company, based in Bengaluru, India, disclosed this security incident in a filing with the U.S. Securities and Exchange Commission (SEC). According to the filing, Zoomcar discovered the issue on June 9 after some of its employees received direct messages from an unknown individual who claimed to have broken into the company’s systems and gained access to its data.
In response, Zoomcar quickly launched its incident response plan — a set of steps companies take to control damage and secure their systems after a cyberattack. The company explained that, so far, there is no sign that financial information, unencrypted passwords, or highly sensitive personal identifiers were stolen in this breach.
Zoomcar has since introduced additional security measures to strengthen its internal systems and cloud services. These steps include improved system monitoring and a careful review of user access controls to prevent future attacks. However, the company did not give detailed explanations of these new protections.
The company also confirmed that it is working with independent cybersecurity experts to investigate the incident further. Relevant law enforcement agencies and regulatory authorities have been notified and are now involved in the case.
At this point, Zoomcar has not provided any public updates on whether it has directly informed the affected users or if it has managed to identify the hacker responsible.
As of now, the company says this breach has not affected its day-to-day business operations.
Zoomcar, founded in 2013, is a platform that allows users to rent cars by the hour, day, week, or month. It currently operates in 99 cities with a fleet of over 25,000 cars and has built a user base of more than 10 million people. Apart from India, the company also runs services in Egypt, Indonesia, and Vietnam.
Earlier this year, Zoomcar reported that it had seen a 19% increase in car rentals compared to the previous year, totaling over 103,000 bookings. The company also noted a significant improvement in its contribution profit, which rose by over 500% to $1.28 million. However, despite these gains, the company’s net loss still stood at $7.9 million.
Cyberattacks like this highlight the importance of strong cybersecurity practices and continuous monitoring, especially for companies that handle large amounts of personal user information. It also raises questions about how quickly companies notify customers after discovering such breaches.
For now, Zoomcar says it is taking the situation seriously and is fully cooperating with all ongoing investigations.
The Port of Seattle and Seattle-Tacoma International Airport have corroborated that the major system outages which took place late August were caused by a ransomware attack. On August 24, a cyberattack partially disrupted the critical operations at the airport with websites, emails, and phone services down and even affected some services at the airport. The attack was immediately detected and in response, the IT team decided to shut the entire system in order to prevent further damage.
Ransomware attack, by the criminal group, Rhysida, into the computer systems at the airport accessed unauthorised and encrypted some parts of their data. The spokesperson to the airport, Perry Cooper said that IT noticed some malicious activities in the system on the day of the attack and took immediate actions to stop the spread of malware. The Port of Seattle said the measures by its staff, including forensic experts and law enforcement, were effective in thwarting the attack since no further unauthorised activity was detected following the breach.
Operational Disruptions
Even with these measures being put into place, the attack had a great impact on the day-to-day running of Sea-Tac Airport. Passengers were denied the luxury of getting information on arrival and departure flight schedules from the reader boards for the past several days. The airlines at the airport could not use the digital systems and had to revert back to the old method of pen and paper for marking baggage. In addition to the others, critical services such as check-in kiosks, lost and found, Wi-Fi, and reserved parking were affected too, leaving many of both airline customers and employees greatly inconvenienced.
Its official website, portofseattle.org, is still unavailable, leaving travellers to rely on an alternate website, washingtonports.org, for information and updates. These services have been returning to normal gradually, but the attack affected a number of different parts of airport and port operations across the board.
Port of Seattle Refuses to Pay Ransom
Even at this advanced stage, the Port of Seattle has categorically rejected the ransom demands from the attackers. The executive director of the Port Steve Metruck stated in a public statement that to grant the ransom demand would go against the very purpose of the values of the Port and add nothing to its responsibility to protect the money that the taxpayer entrusts to the Port. The Port is alert to the fact that Rhysida may upload all the stolen data on the dark web in the name of retaliation, but it has been faithfully committed to not paying any ransom to criminals.
Although the nature and extent of the stolen data remain unknown, the Port has vowed to inform any employee or passenger whose personal data may have been compromised that their data was stolen.
Securing a Brighter Tomorrow
Over the past few months, other than trying to regain its systems following an attack, the Port of Seattle is also fortifying its defences against future attacks. On its part, the organisation has taken further actions to fortify its cybersecurity to prevent a future version of such attacks. Metruck says, "This has been a learning experience for us and lessons derived from this attack will be instrumental in building on a more resilient IT infrastructure." Apart from that, Port is working with partners to secure business and critical infrastructure.
Despite the hold-up caused by the attack, Port of Seattle officials assured the public that it is still safe to travel from Sea-Tac Airport and to make use of its maritime facilities. This shows commitment to maintaining the safety and the efficiency of its operations, including response and continued recovery.