Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Everest Hacking Group Allegedly Claims Breach of Nissan Motors

Posted on January 12, 2026January 12, 2026 By CWS

Everest hacking group has allegedly claimed a significant breach of Nissan Motor Co., Ltd., elevating recent issues about knowledge safety at massive automotive producers.

In line with early stories, the cybercrime group says it exfiltrated round 900 GB of delicate knowledge from the Japanese carmaker, a quantity that implies broad entry to inside techniques and repositories.

Whereas the total scope of the compromise remains to be unclear, the incident highlights how ransomware and knowledge theft crews proceed to focus on world provide chains and high-value industrial knowledge.

Preliminary indicators of the intrusion surfaced on underground boards, the place the group reportedly shared proof-of-compromise samples to assist its claims.

These samples might embody inside paperwork, engineering recordsdata, or customer-related information, though this has not but been confirmed.

Analysts be aware that such leaks typically function strain techniques in double-extortion schemes, the place attackers each encrypt and threaten to publish knowledge.

Hackmanac analysts recognized the alleged breach and issued an early cyberattack alert, flagging Nissan’s manufacturing operations in Japan as the first focus and warning that the incident stays below verification.

From an assault vector standpoint, the exercise seems aligned with frequent techniques utilized by data-theft-first teams that search preliminary entry through uncovered distant companies, stolen VPN credentials, or phishing campaigns.

As soon as inside, menace actors usually transfer laterally, map the community, and hunt for file servers, code repositories, and backup infrastructure.

Knowledge stolen (Supply – X)

In lots of such circumstances, they deploy customized scripts to automate the gathering and staging of high-value knowledge earlier than exfiltration.

Whereas it might symbolize a pattern leak web page used to showcase stolen recordsdata and directories to potential consumers or to strain the sufferer.

Suspected Knowledge Exfiltration Workflow

Whereas technical indicators for this particular Nissan incident are nonetheless rising, the broader Everest playbook suggests a structured knowledge exfiltration pipeline that defenders can examine and emulate in lab simulations.

After gaining a foothold on a compromised host, the malware or operator scripts often enumerate mounted shares and accessible drives, constructing a goal listing of paths comparable to finance servers, engineering shares, and doc administration techniques.

A simplified PowerShell-style enumeration routine might appear like:-

Get-SmbShare | ForEach-Object {
Get-ChildItem “$env:COMPUTERNAME$_” -Recurse -ErrorAction SilentlyContinue |
The place-Object { $_.Size -gt 5MB } |
Out-File “C:ProgramDatatarget_files.txt” -Append
}

In lots of campaigns, attackers then compress staged knowledge into archives and exfiltrate it over HTTPS or through anonymizing tunnels to command-and-control servers, typically mixing with regular outbound visitors.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Allegedly, Breach, Claims, Everest, Group, Hacking, Motors, Nissan

Post navigation

Previous Post: New Research Uncovers 28 Unique IP Addresses and 85 Domains Hosting Carding Markets
Next Post: Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service

Related Posts

NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
Exposed ‘Kim’ Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure Cyber Security News
Shanya EDR Killer Leveraged by Hackers to Clear the Way for Ransomware Infection Cyber Security News
Aviatrix Cloud Controller Authentication Vulnerability Let Attackers Execute Remote Code Cyber Security News
Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond
  • InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters
  • Instagram Fixes Password Reset Vulnerability Amid User Data Leak
  • AI Automation Exploits, Telecom Espionage, Prompt Poaching & More
  • Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond
  • InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters
  • Instagram Fixes Password Reset Vulnerability Amid User Data Leak
  • AI Automation Exploits, Telecom Espionage, Prompt Poaching & More
  • Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark