Hack Notice

Hack Notice: CA: Threat actors dump tens of thousands of drivers license images and several thousand credit reports for customers of Walters Automotive Group

CA: Threat actors dump tens of thousands of drivers license images and several thousand credit reports for customers of Walters Automotive Group

Source
https://www.databreaches.net/ca-threat-actors-dump-tens-of-thousands-of-drivers-license-images-and-credit-reports-for-customers-of-walters-automotive-group/
Description
credit reports for a few thousand customers of Audi Ontario and Porsche Ontario dealerships were dumped by ransomware threat actors who claim they locked Walter’s Automotive group and exfiltrated data, but Walter’s would not respond to them. More than 22,000 driver’s license images were also in the data dump. If you bought an Audi or a Porsche from Audi Ontario or Porsche Ontario in california — or didn’t buy ace but had just applied for credit for one of the two dealerships — your personal details and citation report may now live freely available on the dark web. Threat actors known as vice Society recently claimed to hold locked and exfiltrated data from Walter’s Automotive Group. Walter’s owns audio Ontario and Porsche Ontario, as well as Porsche Riverside, Walter’s Mercedes-Benz, Walter’s Audi, and Walter’s Sprinter. According to a vice society spokesperson’s statement to DataBreaches.net, Walter’s did not respond to their tangency to pundit a ransom demand. as a result, Vice Society dumped the data that they had exfiltrated during the attack. in one folder alone, DataBreaches.net found more than 21,000 images of driver’s licenses. The image files were date-stamped between may of 2018 and May of 2021. Another folder contained almost 4,400 files related to customer credit applications for customers of Audi Ontario. These did not all represent unique customers, as for each customer, there was often 2 or triad files. The appointment stamps on these were between January 2017 and June, 2021. The applications and completed reports contain the applicant’s name, engagement of birth, current address, SSN, phone number, email address, current and past employers, past addresses, salary information, and citation history including FICO score, loan balances, etc. Another folder under Audi Ontario contained almost 200 driver’s permission images. credit applications for some Porsche Ontario customers or potential customers were also found in the dump. There were more than 1,000 files, but again, that is not the number of unique customers. Most of the citation account applications and reports are within the last year. There was also a file with more than 1,000 driver’s license images. Neither Audi Ontario, Porsche Ontario, or Walter’s Automotive group replied to multiple inquiries sent to them this past weekend via web site contact forms as well as email to the automotive group’s IT department. DataBreaches.net sent email inquiries tonight to a few recent customers of Audi Ontario. One already replied, and informed this site that he has not been notified by Walter’s or the dealership of any data theft or incident. If the dealerships or Walter’s responds to this site’s inquiries, this post will be updated.    

About HackNotice and CA: Threat actors dump tens of thousands of drivers license images and several thousand credit reports for customers of Walters Automotive Group

HackNotice is a service that notices trends and patterns in publically available data so as to identify possible data breaches, leaks, hacks, and other data incidents on behalf of our clients. HackNotice monitors data streams related to breaches, leaks, and hacks and CA: Threat actors dump tens of thousands of drivers license images and several thousand credit reports for customers of Walters Automotive Group was reported by one of those streams. HackNotice may also have the breach date, hack date, the hacker responsible, the hacked industry, the hacked location, and any other parts of the hack, breach, or leak that HackNotice can report on for the consumers of our product.

If you are a user of CA: Threat actors dump tens of thousands of drivers license images and several thousand credit reports for customers of Walters Automotive Group their products, services, websites, or applications and you were a client of HackNotice, monitoring for CA: Threat actors dump tens of thousands of drivers license images and several thousand credit reports for customers of Walters Automotive Group you may have been alerted to this report about CA: Threat actors dump tens of thousands of drivers license images and several thousand credit reports for customers of Walters Automotive Group . HackNotice is a service that provides data, information, and monitoring that helps our clients recover from and remediate data breaches, hacks, and leaks of their personal information. HackNotice provides a service that helps our clients know what to do about a hack, breach, or leak of their information.

If CA: Threat actors dump tens of thousands of drivers license images and several thousand credit reports for customers of Walters Automotive Group had a transgress of consumer data or a data leak, then there may be additional actions that our clients should take to protect their digital identity. data breaches, hacks, and leaks often direct to and cause indistinguishability theft, account take overs, ransomware, spyware, extortion, and malware. account takeovers are often caused by credential reuse, password reuse, easily guessed passwords, and are facilitated by the sharing of billions of credentials and other customer info through data leaks, as the direct resultant of data breaches and hacks.

HackNotice monitors trends in publically available data that indicates tens of thousands of data breaches each year, along with billions of records from data leaks each year. On behalf of our clients, HackNotice workings to monitor for hacks that lead-in to lower client security and digital identities that have been exposed and should live considered vulnerable to attack. HackNotice workings with clients to key the extent that digital identities hold been exposed and provides remediation suggestions for how to handgrip each type of exposure.

HackNotice monitors the hacker community, which is a network of individuals that share data breaches, hacks, leaks, malware, spyware, ransomware, and many other tools that are often used for financial fraud, account take overs, and further breaches and hacks. HackNotice monitors the hacker community specifically for breaches, hacks, and data leaks that hurt consumers. HackNotice applies industry specific knowledge and advanced security practices to monitor for trends that indicate breaches, hacks, and exposed digital identities.

HackNotice also enables clients to share cut notices with their friend, family, and collogues to help increase awareness around alleged hacks, breaches, or data leaks. HackNotice works to provide clients with sharable reports to help increase the security of our clients personal network. The security of the people that our clients interact with directly impacts the layer of security of our clients. Increased exposure to accounts that have been taken over by hackers leads to further account take overs through phishing, malware, and other attach techniques.

If you found this plug notice to be helpful, then you may be interested in reading some additional cut notices such as:

h billet of the year. At the end of 2015, aim published a account claiming a number loss of $290 mIt may depress the price of its acquisition by Verizon by $1 billion. Verizon later released their renrmation are increasingly common in the United States. Although such incidents po

Defacement http://samigaluh.kulonprogokab.go.id

siro-group.com

Brunswick County town falls victim to series of ransomware hacks