Connect with us

Hi, what are you looking for?



Nissan Restoring Systems After Cyberattack

Nissan Oceania says it has been working on restoring its systems after falling victim to a cyberattack.

Japanese car manufacturer Nissan has disclosed a cyberattack impacting the internal systems at Nissan Oceania.

A regional division of the multinational carmaker, Nissan Oceania is responsible for the company’s operations in Australia and New Zealand.

Nissan Oceania disclosed the cyberattack in an incident notification on its regional websites, but did not share specific information on the type or extent of the breach, citing its ongoing investigation into the matter.

“The Australian and New Zealand Nissan Corporation and Financial Services advises that its systems have been subject to a cyber incident. Nissan is working with its global incident response team and relevant stakeholders to investigate the extent of the incident and whether any personal information has been accessed,” the carmaker said.

The company noted that the relevant authorities in Australia and New Zealand have been informed of the attack, encouraging customers to keep an eye out for any unusual or scam activities across their accounts.

Nissan also said that it has been working on restoring the systems that were affected by the incident, which suggests that a ransomware attack might have forced it to take the systems offline.

Shutting systems down or disconnecting them from the network is the typical response to ransomware infections, as it helps contain the attack and may prevent broad file encryption.

Nissan also noted that, while its dealer systems would be impacted by the incident, local dealerships continue to operate, thus advising customers to contact local Nissan dealers directly to receive assistance.  

Advertisement. Scroll to continue reading.

The company also promised to provide additional information on the attack as soon as details become available.

Nissan is the second Japanese automobile maker to disclose a cyberattack within the past month, after Yamaha Motors’ Philippines subsidiary fell victim to a ransomware attack in October.

Related: Yellen Says Ransomware Attack on China’s Biggest Bank Minimally Disrupted Treasury Market Trades

Related: Western Digital Confirms Ransomware Group Stole Customer Information

Related: Watch Sessions: Ransomware Resilience & Recovery Summit

Written By

Ionut Arghire is an international correspondent for SecurityWeek.


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.