Automotive Data Exposed in Git File Leak at Major Roadside Assistance and Insurance Vendor

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

A critical Git file leak at a major roadside assistance and insurance vendor has exposed sensitive data from over 6,700 leading automotive giants due to a misconfigured Git repository, which revealed confidential details of one million records. 

Exposed Data  

The leak uncovered by CloudSEK’s SVigil platform contained over 20GB of data, including the complete source code of internal e-portals, hardcoded credentials, and more than one million personally identifiable information (PII) records.  

Incident scheme
Incident scheme | Source: CloudSEK 

The PII and sensitive financial documents belonging to over 6,700 vehicle merchants and their customers included: 

Leaked files sample
Leaked files sample | Source: CloudSEK

Attackers could gain access to the complete source code of the company's e-portals, as critical credentials were found embedded in the code:

This month, TechNadu reported on a flaw in the web portal of a “widely known automaker with several popular sub-brands” that allowed remote car unlocking vulnerability and access to 1,000 dealerships.

Implications  

This automotive data breach has vast implications for entities relying on the compromised vendor. These vulnerabilities present attackers with avenues to conduct large-scale phishing campaigns, impersonate the company, trigger unauthorized transactions, and infiltrate cloud databases.  

Furthermore, the leaked information lays bare the company’s core development architecture, allowing attackers to engineer future breaches.  

To address such incidents, organizations must implement secure development practices by ensuring that .git folders remain inaccessible in production environments. Additionally, implementing key rotation policies and monitoring supply chain vulnerabilities can reduce exposure. 

Regular audits, up-to-date employee training, and third-party risk assessments are essential components of a robust cybersecurity strategy.  


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: