Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Zoomcar Hacked – 8.4 Million Users Sensitive Details Exposed

Zoomcar Hacked – 8.4 Million Users Sensitive Details Exposed

Posted on June 16, 2025June 16, 2025 By CWS

Automobile-sharing big Zoomcar Holdings, Inc. has disclosed a major cybersecurity incident that compromised delicate private info of roughly 8.4 million customers. 

The breach, found on June 9, 2025, represents one of many largest knowledge exposures within the mobility sector, highlighting ongoing vulnerabilities in cloud infrastructure safety. 

In accordance with an SEC Type 8-Ok submitting, menace actors gained unauthorized entry to the corporate’s info methods, exposing names, cellphone numbers, automobile registration particulars, private addresses, and e mail addresses of affected customers.

Zoomcar Hacked

The cybersecurity incident got here to mild when Zoomcar workers acquired exterior communications from menace actors claiming unauthorized entry to firm databases. 

The assault seems to have focused a particular dataset containing personally identifiable info (PII) fairly than the corporate’s whole infrastructure. 

In accordance with the SEC disclosure, the compromised knowledge repository included vital consumer info similar to full names, cell phone numbers, automobile registration numbers, residential addresses, and e mail addresses related to consumer accounts.

Cybersecurity consultants notice that this sort of knowledge publicity follows typical patterns of Superior Persistent Menace (APT) assaults, the place malicious actors conduct reconnaissance earlier than extracting worthwhile datasets. 

The breach methodology suggests potential vulnerabilities within the firm’s entry management mechanisms and community segmentation protocols. 

Nevertheless, Zoomcar’s preliminary investigation signifies that monetary info, together with cost card knowledge and checking account particulars, remained safe. 

Moreover, plaintext passwords and different delicate authentication credentials weren’t compromised, suggesting the corporate applied correct password hashing algorithms and safe credential storage practices.

The size of the breach impacts roughly 8.4 million customers throughout Zoomcar’s operational markets, making it a major incident requiring obligatory disclosure beneath varied knowledge safety rules. 

The uncovered private info might doubtlessly be exploited for id theft, social engineering assaults, or focused phishing campaigns in opposition to affected customers.

Upon discovering the safety incident, Zoomcar instantly activated its incident response plan, following established cybersecurity frameworks such because the NIST Cybersecurity Framework protocols. 

The corporate’s safety group applied containment measures to forestall additional unauthorized entry and commenced forensic evaluation to find out the assault vector and scope of compromise. 

These speedy response actions included isolating affected methods, implementing extra community monitoring instruments, and conducting complete safety audits throughout their cloud infrastructure.

The corporate has engaged third-party cybersecurity specialists to help with the investigation and implement enhanced safety controls. 

Automate menace response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Details, Exposed, Hacked, Million, Sensitive, Users, Zoomcar

Post navigation

Previous Post: Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels
Next Post: Archetyp Dark Web Market Shut Down by Law Enforcement

Related Posts

Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process Cyber Security News
New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account Cyber Security News
Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups Cyber Security News
New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets Cyber Security News
Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records Cyber Security News
Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark