Cybercriminals have reportedly targeted several major automakers, using bots to compromise nearly 15,000 customer accounts. These attackers then harvested sensitive data related to individual vehicles and offered it for sale through private Telegram channels, according to findings by cybersecurity firm Kasada.
Furthermore, the breach appears to have involved automated account takeover (ATO) techniques, granting the hackers access to personal information and critical vehicle details such as make, model, user data, addresses, and vehicle identification numbers (VINs). Although the automakers involved were not named in the report, one is based in Europe, and the other two are based in the United States.
Around 15,000 compromised accounts were offered for sale, priced at approximately $2 per account. Kasada emphasized the potential for fraud, particularly concerning the stolen VINs. The stolen data could enable identity theft and provide criminals with information to target specific car models for theft, register stolen vehicles, and even take control of GPS-enabled mobile apps. Kasada confirmed the accuracy of the data, including the VINs, through its investigation.
The researchers suspect that the cybercriminals employed a multi-step process to capture the account information. Initially, bots were loaded with login credentials stolen from other websites, exploiting the common practice of password reuse.
Once the bots successfully breached an account, they gathered valuable data and exfiltrated it to servers controlled by the hackers. Kasada has been actively monitoring illicit bots, warning about their involvement in various scams and fraudulent activities, including prescription drug schemes and attempts to undermine retailers, particularly during the holiday season.
Credential stuffing attacks have targeted a range of services, including grocery and food delivery platforms, sports betting sites, and even password management apps and cybersecurity companies.