CyberSecurity news

FlagThis - #dataleak

@siliconangle.com - 61d
References: electrek.co , malware.news , ciso2ciso.com ...
A significant data leak has exposed the location data of approximately 800,000 Volkswagen electric vehicles, including models from VW, Audi, Seat, and Skoda. This breach was a result of a cloud misconfiguration within Volkswagen's software subsidiary, Cariad, which stores data on Amazon Web Services. The leaked data included real-time GPS locations, with some being accurate to within ten centimeters, along with other sensitive information. The issue came to light after a whistleblower alerted the German newspaper Der Spiegel, and security researchers from the Chaos Computer Club also helped uncover the leak.

The exposed data potentially allows for the tracking of vehicle locations and could be linked to vehicle owners, their names, and contact details. This raises serious privacy concerns, and in some instances, it was possible to even determine the travel patterns of individuals, including two German politicians. The incident highlights the critical importance of robust cloud security practices by automotive manufacturers and their software subsidiaries. While Volkswagen claims accessing the data required bypassing security mechanisms, it underscores the severe consequences of mishandling sensitive customer information.

Recommended read:
References :
  • electrek.co: Massive data leak at Volkswagen exposes locations of 800,000 EV drivers, for months
  • malware.news: Almost 800K electric cars' data exposed by Cariad
  • Techzine Global: Volkswagen data breach highlights major privacy risks
  • ciso2ciso.com: CISO2CISO article about exposed cloud server tracking 800,000 Volkswagen, Audi, and Skoda EVs.
  • The Verge: The Verge report on Volkswagen leak exposing location data for 800,000 electric cars.
  • Electrek: Electrek article about massive data leak at Volkswagen exposing locations of 800,000 EV drivers.
  • Latest from TechRadar: TechRadar article about over 800,000 electric car owners and drivers having private info exposed online.
  • Cybernews: 800,000 Volkswagen owners' data was left unprotected and exposed. What are your thoughts? Read more⤵️
  • ciso2ciso.com: Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs – Source:hackread.com
  • arstechnica.com: whistleblower-finds-unencrypted-location-data-for-800000-vw-evs
  • techcrunch.com: TechCrunch reports on a Volkswagen leak that exposed precise location data.
  • www.engadget.com: Engadget reports huge Volkswagen data leak exposed the locations of 460,000 EV drivers.
  • www.scworld.com: Almost 800K electric cars' data exposed by Cariad
  • pxlnv.com: Volkswagen Subsidiary Left Vehicle Location Data Unprotected in Amazon Storage
  • siliconangle.com: Location data from 800,000 Volkswagen vehicles exposed by cloud misconfiguration
  • Pixel Envy: Volkswagen Subsidiary Left Vehicle Location Data Unprotected in Amazon Storage
  • www.carscoops.com: VW Group had sensitive info, including GPS coordinates, of 800K+ electric vehicles exposed on an unprotected AWS database for months before it was alerted
  • Ars OpenForum: Whistleblower finds unencrypted location data for 800,000 VW EVs
  • SiliconANGLE: Location data from 800,000 Volkswagen vehicles exposed by cloud misconfiguration
  • Techmeme: VW Group had sensitive info, including GPS coordinates, of 800K+ electric vehicles exposed on an unprotected AWS database for months before it was alerted (Thanos Pappas/Carscoops)
  • toot.majorshouse.com: Why do they need the location data in the first place? Why does any company need this data? Volkswagen leak exposed location data for 800,000 electric cars
  • Dataconomy: A data leak exposed the location data of approximately 800,000 Volkswagen (VW) electric vehicles (EVs) for several months, impacting vehicles from VW, Audi, Seat, and Skoda, as reported by Der Spiegel.
  • Mashable: Volkswagen leak exposed location of 800,000 electric car drivers for months
  • Miguel Afonso Caetano: Connected cars are great—at least until some company leaves unencrypted location data on the Internet for anyone to find.
  • TechSpot: Volkswagen leak exposes private information of 800,000 EV owners, including location data
  • discuss.techlore.tech: Volkswagen leak exposed location data for 800,000 electric cars
  • Techlore: Volkswagen leak exposed location data for 800,000 electric cars
  • jbz: Cariad has since patched the vulnerability, which had revealed data about the usage of Skodas, Audis, and Seats, as well as what Motor1 calls "incredibly detailed data" for VW ID.3 and ID.4 owners. The data set also included pinpoint location data for 460,000 of the vehicles, which Der Spiegel said could be used to paint a picture of their owners' lives and daily activities
  • DMR News: Volkswagen Data Leak Exposed Location Data for 800,000 Electric Cars
  • osint10x.com: Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs
  • Osint10x: Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs
  • Alex Jimenez: Volkswagen leak exposed location data for 800,000 electric cars The leak also included the emails, addresses, and phone numbers of drivers in some cases, Der Spiegel reports.

Zack Whittaker@techcrunch.com - 77d
UnitedHealthcare's Optum recently experienced a security lapse, exposing an internal AI chatbot to the public internet. This chatbot, designed for employees to ask questions about claims and related procedures, was accessible without a password. A security researcher discovered the vulnerability, and TechCrunch was able to verify it before Optum took the chatbot offline. While it's not believed that the chatbot contained sensitive patient data, its exposure raises concerns about the security practices surrounding internal AI tools, particularly as UnitedHealth faces scrutiny over its broader use of AI.

The chatbot, described by an Optum spokesperson as a "demo tool" for proof of concept, maintained a history of employee inquiries, including questions like "What should be the determination of the claim" and "How do I check policy renewal date." Interestingly the bot also produced a seven paragraph rhyming poem about denying health claims when asked. Optum has since stated that the tool was never put into production and the site is no longer accessible. They have confirmed that the tool did not use or contain any protected health information.

Recommended read:
References :
  • Slashdot :verified:: UnitedHealthcare's Optum Left an AI Chatbot, Used By Employees To Ask Questions About Claims, Exposed To the Internet
  • Zack Whittaker: A spokesperson for Optum said the chatbot was a 'demo tool developed as a potential proof of concept.' The chatbot kept a stored history of what employees asked the chatbot, including: 'What should be the determination of the claim,' and 'How do I check policy renewal date.'
  • TechCrunch: UnitedHealth’s Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
  • TechCrunch: UnitedHealthcare’s Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
  • techcrunch.com: UnitedHealth’s Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
  • yro.slashdot.org: UnitedHealthcare's Optum Left an AI Chatbot, Used By Employees To Ask Questions About Claims, Exposed To the Internet
  • tcrn.ch: UnitedHealthcare’s Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
  • ansuz / ???: UnitedHealth’s Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
  • Patrick C Miller :donor:: UnitedHealth's Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet | TechCrunch
  • bsky.app: UnitedHealth's Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet | TechCrunch

Amar Ćemanović@CyberInsider - 2d
Have I Been Pwned (HIBP) has recently integrated a massive dataset of 23 billion rows of stolen credentials from the ALIEN TXTBASE stealer logs. This integration has exposed 284 million unique email addresses that were compromised through infostealer malware. The data, which includes 244 million previously unseen passwords, was originally shared on the Telegram channel ALIEN TXTBASE. HIBP users who are signed up to be notified when their emails appear in a database dump will receive a notification email. All users can also check manually via the service’s website.

This staggering collection of information is a result of likely millions of people's computers being infected by one or more data-stealing malware strains. This addition of stolen credentials highlights the scale of unstoppable infostealer malware. HIBP has also added 244 million new compromised passwords to Pwned Passwords.

Recommended read:
References :
  • The Register - Security: With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare
  • CyberInsider: HIBP Adds 284 Million Stolen Credentials from Infostealer Logs
  • heise online English: Data leak search website Have I Been Pwned increased by 284 million accounts Mail addresses and passwords captured by Infostealer malware were shared in the Telegram channel ALIEN TXTBASE. This data is now integrated into HIBP.
  • Help Net Security: Is your email or password among the 240+ million compromised by infostealers?
  • gbhackers.com: Have I Been Pwned Reports Huge Data Leak, Adds 284 Million Stolen Accounts
  • Blog: HIBP adds over 284 million leaked credentials to its database

@www.cnbc.com - 30d
DeepSeek AI, a rapidly growing Chinese AI startup, has suffered a significant data breach, exposing a database containing over one million log lines of sensitive information. Security researchers at Wiz discovered the exposed ClickHouse database was publicly accessible and unauthenticated, allowing full control over database operations without any defense mechanisms. The exposed data included user chat histories, secret API keys, backend details, and other highly sensitive operational metadata. This exposure allowed potential privilege escalation within the DeepSeek environment.

The Wiz research team identified the vulnerability through standard reconnaissance techniques on publicly accessible domains and by discovering unusual, open ports linked to DeepSeek. The affected database was hosted at oauth2callback.deepseek.com:9000 and dev.deepseek.com:9000. Researchers noted the ease of discovery of the exposed data and the potential for malicious actors to have accessed it. DeepSeek has been contacted by security researchers, and has now secured the database after the discovery, however, it remains unclear if unauthorized third-parties were also able to access the information.

Recommended read:
References :
  • NewsGuard's Reality Check: NewsGuard: with news-related prompts, DeepSeek's chatbot repeated false claims 30% of the time and provided non-answers 53% of the time, giving an 83% fail rate (NewsGuard's Reality Check)
  • www.theregister.com: Upgraded China's DeepSeek, which has rattled American AI makers, has limited new signups to its web-based interface
  • : Social.skynetcloud.site post about DeepSeek's database leak
  • www.wired.com: Wiz: DeepSeek left one of its critical databases exposed, leaking more than 1M records including system logs, user prompt submissions, and users' API keys (Wired)
  • ciso2ciso.com: Guess who left a database wide open, exposing chat logs, API keys, and more? Yup, DeepSeek
  • The Hacker News: DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked
  • Wiz Blog | RSS feed: Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog
  • www.theverge.com: News about DeepSeek's data security breach.
  • www.wired.com: Wired article discussing DeepSeek's AI jailbreak.
  • arstechnica.com: Report: DeepSeek's chat histories and internal data were publicly exposed.

@www.bleepingcomputer.com - 42d
Hotel management platform Otelier has suffered a significant data breach, compromising the personal information and hotel reservations of millions of guests. The breach occurred after threat actors gained access to Otelier's Amazon S3 cloud storage. This allowed them to steal a large amount of sensitive data, reportedly close to eight terabytes. The affected hotel brands include major names like Marriott, Hilton, and Hyatt, raising concerns about widespread impact.

The stolen data includes personally identifiable information and reservation details, which could potentially expose guests to identity theft and various types of fraud. Otelier has confirmed the data breach and stated that they are communicating with their impacted customers. The initial breach is said to have started in July 2024 and continued through October of the same year. This extended access allowed the attackers to exfiltrate the substantial amount of data that they are now believed to have.

Recommended read:
References :

Pierluigi Paganini@Security Affairs - 21h
References: securityaffairs.com , The420.in ,
The LockBit ransomware group has targeted newly appointed FBI Director Kash Patel with an alleged "birthday gift" consisting of leaked classified documents. LockBitSupp, the group's alleged leader, posted a message on February 25, 2025, mocking Patel and claiming the group possesses sensitive data that could "destroy" the FBI. This incident raises serious cybersecurity concerns about potential data breaches targeting high-profile individuals and agencies.

The post, found on LockBit's dark leak blog, describes an "archive of classified information" containing over 250 folders of materials dating back to May 29, 2024. This stolen data is presented as a "guide, roadmap, and some friendly advice" to the new FBI Director. The ransomware cartel's actions represent a bold threat, highlighting the increasing sophistication and audacity of cybercriminals targeting government entities and their leadership.

Recommended read:
References :
  • securityaffairs.com: LockBit taunts FBI Director Kash Patel with alleged “Classifiedâ€� leak threat
  • The420.in: LockBit Targets FBI Director with Alleged Classified Leak
  • iHLS: In a chilling message posted on February 25, 2025, the alleged leader of the notorious LockBit ransomware group, LockBitSupp, issued a disturbing “birthday giftâ€� to Kash Patel, the newly appointed Director of the FBI.

@cyberinsider.com - 8d
B1ack's Stash, an illicit carding marketplace, released a dataset containing over 1 million stolen credit and debit cards on a dark web forum on February 19, 2025. Experts are warning that the release of over 1 million unique credit and debit cards by the carding website B1ack’s Stash appears to be a marketing strategy to attract new customers and gain notoriety within the cybercrime ecosystem. Other underground marketplaces like Joker Stash and BidenCash facilitate the sale of payment card data.

The cybersecurity community is on high alert. It has been reported that the leaked data includes PAN, expiration date, CVV2, cardholders' personal details, email address, IP address, and User-Agent, obtained through e-skimming. Banking institutions are being advised to monitor the dark web for the offering of credit and debit cards to prevent fraudulent activities.

Recommended read:
References :
  • cyberinsider.com: On February 19, 2025, the illicit carding marketplace B1ack's Stash released a dataset containing over 1 million stolen credit and debit cards on a dark web forum.
  • securityaffairs.com: Experts warn that the carding website B1ack’s Stash released a collection of over 1 million unique credit and debit cards.
  • Talkback Resources: Carding website B1acks Stash released over 1 million credit and debit cards to attract customers, while underground marketplaces like Joker Stash and BidenCash facilitate the sale of payment card data, prompting banks to monitor the dark web for fraudulent activities.
  • CyberInsider: On February 19, 2025, the illicit carding marketplace B1ack's Stash released a dataset containing over 1 million stolen credit and debit cards on a dark web forum.
  • ciso2ciso.com: B1ack’s Stash released 1 Million credit cards
  • Talkback Resources: Carding website B1acks Stash released over 1 million credit and debit cards to attract customers, while underground marketplaces like Joker Stash and BidenCash facilitate the sale of payment card data, prompting banks to monitor the dark web for fraudulent activities.
  • Talkback Resources: Carding website B1acks Stash released over 1 million credit and debit cards to attract customers, while underground marketplaces like Joker Stash and BidenCash facilitate the sale of payment card data, prompting banks to monitor the dark web for fraudulent activities.
  • Talkback Resources: Carding website B1acks Stash released over 1 million credit and debit cards to attract customers, while underground marketplaces like Joker Stash and BidenCash facilitate the sale of payment card data, prompting banks to monitor the dark web for fraudulent activities.

MalBot@malware.news - 72d
References: DataBreaches.Net , malware.news ,
Cisco experienced a significant data leak due to an internal misconfiguration. The hacker group known as "IntelBroker" claimed responsibility for accessing sensitive information. This occurred after Cisco inadvertently left its DevHub instance exposed, allowing unauthorized access. The breach enabled the hackers, identified as @zjj, @IntelBroker, and @EnergyWeaponUser to download approximately 4.5TB of data, which is associated with various Cisco products.

While much of the exposed data was public, the hackers also accessed files not intended for public release. Cisco's investigation confirmed that the data was obtained from a public-facing DevHub environment. The initial samples shared by the group included files relating to various Cisco software offerings, totaling 2.9GB. The breach included software from key products, including Cisco IOS XE, Webex and Umbrella, and raised concerns about potential vulnerabilities.

Recommended read:
References :
  • DataBreaches.Net: The hacker and forum owner known as “IntelBroker” announced that he and others breached Cisco systems and obtained source code and other valuable information.
  • malware.news: The hacker and forum owner known as “IntelBroker” announced that he and others breached Cisco systems and obtained source code and other valuable information.
  • Cyber Security News: The infamous hacker group Inter Broker has successfully breached Cisco’s network, allegedly exfiltrating approximately 4.5TB of sensitive data associated with various Cisco products.

Stefan Hostetler, Julian Tuin, Trevor Daher, Jon Grimm, Alyssa Newbury, Joe Wedderspoon, and Markus @Arctic Wolf - 44d
A new hacking group, known as Belsen Group, has leaked configuration files and VPN credentials for over 15,000 FortiGate firewall devices. The data, which includes full configuration dumps, device management certificates and even some plain text passwords, was made freely available on the dark web. Security researcher Kevin Beaumont first brought the issue to light, later confirmed by CloudSEK, and noted the vulnerability primarily affected Fortigate 7.0.x and 7.2.x devices.

The Belsen Group is believed to have been active since 2022, despite only recently appearing on social media and cybercrime forums. The leaked data was likely collected using a zero-day exploit in 2022, specifically CVE-2022-40684, and has only been released in January 2025. This means even organizations that have since patched may still be vulnerable if their configurations were captured by Belsen Group in 2022. The exposure of the data, which includes firewall rules, poses a significant security risk to affected organizations.

Recommended read:
References :
  • ciso2ciso.com: Ciso2Ciso news about new hacking group leaks configuration of 15,000 Fortinet Firewalls.
  • Kevin Beaumont: Cyberplace.Social post by GossiTheDog about Fortigate config data leak.
  • www.bleepingcomputer.com: BleepingComputer Article about hackers leak configs and VPN credentials for 15,000 FortiGate devices.
  • CySec Feeds: RT @S0ufi4n3: “2022 zero day was used to raid Fortigate firewall configs. Somebody just released them.“
  • www.theregister.com: 15,000 FortiGate Firewall Configurations Leaked by Belsen Group