Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys

Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys

Posted on October 29, 2025October 29, 2025 By CWS

Safety researcher Eaton Zveare has disclosed essential vulnerabilities in Tata Motors’ methods that uncovered over 70 terabytes of delicate information, together with buyer private data, monetary experiences, and fleet administration particulars.

The failings, uncovered throughout moral hacking in 2023 however publicly shared solely now, concerned hardcoded AWS entry keys on public-facing web sites, granting unauthorized entry to a whole bunch of cloud storage buckets.

This breach highlights ongoing dangers in main automakers’ digital infrastructure, probably compromising information on tens of millions of consumers and sellers.​

Tata Motors’ E-Dukaan platform, an e-commerce web site for car spare components, contained plaintext AWS credentials immediately in its supply code, permitting anybody to entry huge repositories of confidential information.

These keys unlocked buyer database backups, lists with market intelligence, and a whole bunch of hundreds of invoices revealing private particulars like names, addresses, and Indian PAN numbers.

One bucket alone held about 40 GB of admin order experiences, underscoring the sheer quantity of uncovered business information. Zveare famous that the keys had been used merely to fetch a small 4 KB tax codes file, a minimal justification for such intensive dangers.​

Decryptable Credentials in FleetEdge System

An analogous challenge plagued FleetEdge, Tata’s fleet monitoring resolution, the place AWS keys appeared encrypted in API responses however had been simply decrypted through client-side code.

This “pointless” encryption, akin to latest flaws at Intel, uncovered one other trove of buckets, together with a datalake with over 70 TB of fleet insights courting again to 1996.

Attackers couldn’t solely obtain historic car information but additionally add malware to linked web sites, amplifying the risk to operational safety. The invention emphasised poor key administration practices in client-facing functions.

Compounding the dangers, E-Dukaan’s code included a backdoor to Tableau dashboards, enabling passwordless logins as any person, together with the server admin, through a “trusted token” mechanism.

This granted full entry to inside tasks, monetary experiences, supplier scorecards, and information on over 8,000 customers. Individually, an uncovered Azuga API key within the check drive web site’s JavaScript compromised fleet administration for demonstration automobiles, probably revealing real-time location monitoring. Zveare halted deeper probes to keep away from information exfiltration, confirming no malicious exercise throughout testing.​

The vulnerabilities had been reported by India’s CERT-In on August 8, 2023, however remediation dragged on till January 2024 amid repeated follow-ups. Tata Motors confirmed fixes in 2023 with out notifying affected events, elevating questions on transparency.

As India’s largest automaker, working in 125 nations, such lapses erode belief in information dealing with for car house owners. Consultants urge enhanced code opinions and secret rotation to forestall future exposures.​

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AWS, Data, Drive, Exposed, Info, Keys, Leak, Motors, Sensitive, Tata, Test

Post navigation

Previous Post: Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing
Next Post: New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Related Posts

Critical OpenClaw Vulnerability Allows AI Agent Hijacking Critical OpenClaw Vulnerability Allows AI Agent Hijacking Cyber Security News
Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data Cyber Security News
Researchers Manipulate Stolen Data to Corrupt AI Models and Generate Inaccurate Outputs Researchers Manipulate Stolen Data to Corrupt AI Models and Generate Inaccurate Outputs Cyber Security News
ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks Cyber Security News
Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads Cyber Security News
New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark