Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

Ransomware Group Claims 100 Gb of Data Stolen From Nissan

The Akira ransomware group has taken credit for the recent attack that impacted Nissan Australia and New Zealand.

Nissan ransomware

A known ransomware group has taken credit for the recent cyberattack targeting Nissan and claims to have stolen 100 Gb of information from the Japanese car manufacturer.

The carmaker revealed in early December that internal systems belonging to Nissan Motor Corporation and Nissan Financial Services in Australia and New Zealand had been targeted by hackers

It confirmed on December 22 that an “unauthorized third party illegally accessed some of the company’s network systems in Australia and New Zealand” and said it has been working on determining what information is impacted.

Cybersecurity agencies in Australia and New Zealand, as well as privacy regulators and law enforcement, have been notified. 

A ransomware group named Akira has taken credit for the attack on Nissan, claiming to have stolen 100 Gb of data, including corporate files and personal information belonging to employees. 

The cybercriminals are threatening to leak the data in the coming days, suggesting that Nissan is not willing to pay the ransom they have demanded.

The Akira ransomware operation emerged in March and is believed to have some links to the notorious Conti group. Akira has targeted roughly 180 organizations to date, mostly in the United States.

Nissan is not the only car manufacturer targeted by cybercriminals in recent months. Toyota Germany has also notified customers of a data breach involving their personal information following a ransomware attack. 

Related: 25k Nissan Customers Affected by Data Breach at Third-Party Software Developer

Advertisement. Scroll to continue reading.

Related: Yamaha Motor Confirms Data Breach Following Ransomware Attack

Related: Toyota Discloses New Data Breach Involving Vehicle, Customer Information

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Ransomware

A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint.

Ransomware

Several major organizations are confirming impact from the latest zero-day exploits hitting Fortra's GoAnywhere software.

Data Breaches

Sony shares information on the impact of two recent unrelated hacker attacks carried out by known ransomware groups. 

Data Breaches

KFC and Taco Bell parent company Yum Brands says personal information was compromised in a January 2023 ransomware attack.

Ransomware

Alphv/BlackCat ransomware group files SEC complaint against MeridianLink over its failure to disclose an alleged data breach caused by the hackers.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.