Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys

Posted on October 29, 2025October 29, 2025 By CWS

Safety researcher Eaton Zveare has disclosed essential vulnerabilities in Tata Motors’ methods that uncovered over 70 terabytes of delicate information, together with buyer private data, monetary experiences, and fleet administration particulars.

The failings, uncovered throughout moral hacking in 2023 however publicly shared solely now, concerned hardcoded AWS entry keys on public-facing web sites, granting unauthorized entry to a whole bunch of cloud storage buckets.

This breach highlights ongoing dangers in main automakers’ digital infrastructure, probably compromising information on tens of millions of consumers and sellers.​

Tata Motors’ E-Dukaan platform, an e-commerce web site for car spare components, contained plaintext AWS credentials immediately in its supply code, permitting anybody to entry huge repositories of confidential information.

These keys unlocked buyer database backups, lists with market intelligence, and a whole bunch of hundreds of invoices revealing private particulars like names, addresses, and Indian PAN numbers.

One bucket alone held about 40 GB of admin order experiences, underscoring the sheer quantity of uncovered business information. Zveare famous that the keys had been used merely to fetch a small 4 KB tax codes file, a minimal justification for such intensive dangers.​

Decryptable Credentials in FleetEdge System

An analogous challenge plagued FleetEdge, Tata’s fleet monitoring resolution, the place AWS keys appeared encrypted in API responses however had been simply decrypted through client-side code.

This “pointless” encryption, akin to latest flaws at Intel, uncovered one other trove of buckets, together with a datalake with over 70 TB of fleet insights courting again to 1996.

Attackers couldn’t solely obtain historic car information but additionally add malware to linked web sites, amplifying the risk to operational safety. The invention emphasised poor key administration practices in client-facing functions.

Compounding the dangers, E-Dukaan’s code included a backdoor to Tableau dashboards, enabling passwordless logins as any person, together with the server admin, through a “trusted token” mechanism.

This granted full entry to inside tasks, monetary experiences, supplier scorecards, and information on over 8,000 customers. Individually, an uncovered Azuga API key within the check drive web site’s JavaScript compromised fleet administration for demonstration automobiles, probably revealing real-time location monitoring. Zveare halted deeper probes to keep away from information exfiltration, confirming no malicious exercise throughout testing.​

The vulnerabilities had been reported by India’s CERT-In on August 8, 2023, however remediation dragged on till January 2024 amid repeated follow-ups. Tata Motors confirmed fixes in 2023 with out notifying affected events, elevating questions on transparency.

As India’s largest automaker, working in 125 nations, such lapses erode belief in information dealing with for car house owners. Consultants urge enhanced code opinions and secret rotation to forestall future exposures.​

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AWS, Data, Drive, Exposed, Info, Keys, Leak, Motors, Sensitive, Tata, Test

Post navigation

Previous Post: Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing
Next Post: New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Related Posts

Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems Cyber Security News
How Smart Timesheet Software Is Changing the Way of Work Cyber Security News
DDoS Mitigation Provider targeted In 1.5 Gpps 1.5 Billion Packets per Second DDoS Attack Cyber Security News
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools Cyber Security News
New CoPhish Attack Exploits Copilot Studio to Exfiltrate OAuth Tokens Cyber Security News
Dark Web Travel Agencies Offering Cheap Travel Deals to Steal Credit Card Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide
  • New TEE.fail Attack Breaks Trusted Environments to Exfiltrate Secrets from Intel and AMD DDR5 Environments
  • Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
  • New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts
  • 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide
  • New TEE.fail Attack Breaks Trusted Environments to Exfiltrate Secrets from Intel and AMD DDR5 Environments
  • Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
  • New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts
  • 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News