The incident exposed personal information for approximately 21,000 Nissan Fukuoka Sales Co., Ltd. customers. Red Hat, the contracted service provider, detected the unauthorized server access on September 26, 2025.
The company immediately revoked the attacker’s access and implemented countermeasures to prevent further intrusions.
However, notification to Nissan was delayed by a week. Red Hat informed Nissan Motor of the breach on October 3, 2025.
Prompting the automotive company to report the incident to the Personal Information Protection Commission on the same day.
The leaked dataset includes customer names, addresses, telephone numbers, and partial email addresses. Sales-related customer information is used by Nissan’s dealer network.
Notably, the breach did not include credit card information or payment details, significantly limiting the risk of financial fraud. The affected customer population comprises individuals who purchased vehicles or received service at the formerly named Fukuoka Nissan Motor Co., Ltd…
It has since rebranded as Nissan Fukuoka Sales Co., Ltd. Nissan stated it will individually notify affected customers and provide guidance on protective measures.
Currently, no evidence indicates that the compromised data has been exploited for fraudulent purposes or sold on underground markets.
Nevertheless, Nissan advised customers to remain vigilant against suspicious communications, including deceptive phone calls or fraudulent correspondence.
The automotive manufacturer confirmed that the Red Hat server environment does not contain customer data beyond the leaked dataset.
Eliminating concerns about additional breaches from the same infrastructure. In response to the incident, Nissan Motor announced it would strengthen oversight of contractors.
Enhance information security protocols across its operations. The company extended apologies to affected customers and business partners.
AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Checklist => Start for Free
The post Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers appeared first on Cyber Security News.
location-picker is a lightweight JavaScript library that allows you to easily get Google Map location…
Open Overlay is a vanilla JavaScript Web Component that adds an accessibility settings widget to…
Full Disk Encryption (FDE) is a security feature that encrypts the entire contents of a…
As we navigate through 2026, the cybersecurity landscape has never been more complex. Threat actors…
ODINI is a sophisticated proof-of-concept malware capable of extracting sensitive information from air-gapped computers protected…
CHICAGO, IL (WOWO) A new era of maritime monitoring is coming to the Great Lakes…
This website uses cookies.