Security Experts:

Connect with us

Hi, what are you looking for?



Millions of Toyota Customers in Japan Hit by Data Breach

Personal information belonging to millions of Toyota customers in Japan may have been compromised as a result of a breach suffered by a Toyota Motor Corporation (TMC) sales subsidiary and its affiliates.

Personal information belonging to millions of Toyota customers in Japan may have been compromised as a result of a breach suffered by a Toyota Motor Corporation (TMC) sales subsidiary and its affiliates.

An investigation into the incident is ongoing, but Toyota said unauthorized access had been detected on March 21 on a server storing information on 3.1 million customers. The exposed data included names, addresses, dates of birth, occupation and other information. Payment card information was not exposed, the company said.

Toyota hackedWhile the attackers gained access to the server, Toyota said there was no evidence that they actually stole anything. The company has named eight affected Toyota and Lexus sales firms.

Toyota representatives told SecurityWeek that the cyberattack was aimed at Toyota Tokyo Sales Holdings Inc., a TMC sales subsidiary in Japan, and its affiliated enterprises. In addition, three independent dealers in Japan may have also been impacted.

“Toyota Motor North America (TMNA) is monitoring the situation closely and is currently unaware of any compromise of TMNA systems associated with this incident or evidence that Toyota or Lexus dealers in the United States have been targeted,” TMNA said in an emailed statement.

The car manufacturer revealed that unauthorized access had also been detected at subsidiaries in Thailand and Vietnam on March 19.

This is the second time Toyota has disclosed a data breach in recent weeks. Toyota Australia revealed on February 21 that it had been hit by a cyberattack. The company stated at the time that no employee or customer data had been compromised, but the incident did cause disruptions to IT systems, including phone and email communications.

Some experts suggested at the time that Toyota Australia was likely targeted by a Vietnam-linked advanced persistent threat (APT) group tracked as APT32 and OceanLotus, which researchers have described as highly sophisticated.

FireEye experts reported after the Toyota Australia breach that APT32 had been known to target the automotive industry.

Related: Nissan Canada Informs 1.1 Million Customers of Data Breach

Related: Tesla Breach: Malicious Insider Revenge or Whistleblowing?

Related: Securing Connected Cars: How to Create a Cost-Effective, Secure In-Vehicle Network Backbone

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Data Protection

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.