Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Nissan. Show all posts

Nissan Confirms Data Leak After Ransomware Attack on Design Unit





Nissan’s Tokyo-based design subsidiary, Creative Box Inc. (CBI), has launched an investigation into a cyberattack after a ransomware group claimed to have stolen a large cache of internal files. The company confirmed that some design data has been compromised but said the breach affects only Nissan itself, as CBI’s work is exclusively for the automaker.

CBI is a specialized design studio established in 1987 as part of Nissan’s global creative network. Unlike mainstream production teams, the unit is often described as a “think tank” where designers experiment with bold and futuristic concepts. This makes the data stored on its systems particularly valuable, as early sketches, 3D models, and conceptual ideas can reveal strategic directions for future vehicles.

The ransomware group behind the attack alleges it copied more than 400,000 files, amounting to around four terabytes of information. According to their claims, the stolen material includes design files, reports, photos, videos, and other documents connected to Nissan’s projects. While the attackers say they have not released the full dataset yet, they have threatened to make it public if their demands are ignored.

Nissan, in its official statement, confirmed the unauthorized access and the leakage of some design material. “A detailed investigation is underway, and it has been confirmed that some design data has been leaked. Nissan and CBI will continue the investigation and take appropriate measures as needed,” the company said. Importantly, Nissan clarified that the stolen information does not affect external clients, contractors, or other organizations, as CBI serves Nissan alone.

The incident illustrates the growing use of ransomware against global companies. Ransomware is a type of malicious software that enables attackers to lock or steal sensitive data and then demand payment in exchange for restoring access or withholding its public release. Beyond financial loss, the exposure of confidential design material carries strategic risks: competitors, counterfeiters, or malicious actors could exploit these files, potentially weakening Nissan’s competitive edge.

The group behind this incident, known as Qilin, has been active in targeting organizations across different sectors. In recent years, security researchers have observed the gang exploiting vulnerabilities in widely used software tools and network devices to gain unauthorized entry. Once inside, they exfiltrate data before applying pressure with public leak threats. This tactic, known as “double extortion,” has become common in the ransomware infrastructure.

Cybersecurity experts stress that incidents like this serve as reminders for companies to remain vigilant. Timely patching of known software vulnerabilities, close monitoring of employee access tools, and strong data backup practices are among the key defenses against ransomware.

For Nissan, the priority now is understanding the full scope of the breach and ensuring no further leaks occur. As investigations continue, the company has pledged to take corrective steps and reinforce its systems against similar threats in the future.


Nissan Source Code Compromised Online Due to Exposed Git Server

 

Nissan's source code got compromised online after the company left an uncovered Git server secured with default access credentials. This leak was learned by a Swiss-based software engineer Tillie Kottmann who shared with ZDNet in an interview that she discovered the leak from an unknown source and analyzed the company’s data. 

The source code repository contained ‘critical information regarding the company’s source code of Nissan mobile apps, components of the Nissan ASIST diagnostics tool, dealer business systems and dealer portal, company’s internal core mobile library, vehicle logistics portal, market research tools, and data, client acquisition and retention tools, vehicle connected services and multiple back ends and internal tools. 

After the data was exposed and began to be shared on telegram via torrent links and hacking platforms, the company took the precautionary step to shut down the Git server yesterday. Mercedes Benz was also the victim of the data breach in May 2020 when the Swiss cybersecurity experts discovered the company misconfigured GitLab server that exposed the source code of multiple Mercedes Benz apps and tools. 

Nissan's spokesperson admitted the incident and further stated, “Nissan conducted an immediate investigation regarding improper access to proprietary company source code. We take this matter seriously and are confident that no personal data from consumers, dealers, or employees were accessible with this security incident. The affected system has been secured, and we are confident that no information in the exposed source code would put consumers or their vehicles at risk”.

The attackers were able to lay their hands on the company’s public repository on GitLab which contains folders with sensitive information from leading companies such as Toyota, SunTech, Pepsi, Motorola, Mediatek, Sierra Nevada Corporation, and the U.S. Air Force Research Laboratory but fortunately all folders do not contain sensitive information that could guide attackers to the secured assets.