Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys

Posted on October 29, 2025October 29, 2025 By CWS

Safety researcher Eaton Zveare has disclosed essential vulnerabilities in Tata Motors’ methods that uncovered over 70 terabytes of delicate information, together with buyer private data, monetary experiences, and fleet administration particulars.

The failings, uncovered throughout moral hacking in 2023 however publicly shared solely now, concerned hardcoded AWS entry keys on public-facing web sites, granting unauthorized entry to a whole bunch of cloud storage buckets.

This breach highlights ongoing dangers in main automakers’ digital infrastructure, probably compromising information on tens of millions of consumers and sellers.​

Tata Motors’ E-Dukaan platform, an e-commerce web site for car spare components, contained plaintext AWS credentials immediately in its supply code, permitting anybody to entry huge repositories of confidential information.

These keys unlocked buyer database backups, lists with market intelligence, and a whole bunch of hundreds of invoices revealing private particulars like names, addresses, and Indian PAN numbers.

One bucket alone held about 40 GB of admin order experiences, underscoring the sheer quantity of uncovered business information. Zveare famous that the keys had been used merely to fetch a small 4 KB tax codes file, a minimal justification for such intensive dangers.​

Decryptable Credentials in FleetEdge System

An analogous challenge plagued FleetEdge, Tata’s fleet monitoring resolution, the place AWS keys appeared encrypted in API responses however had been simply decrypted through client-side code.

This “pointless” encryption, akin to latest flaws at Intel, uncovered one other trove of buckets, together with a datalake with over 70 TB of fleet insights courting again to 1996.

Attackers couldn’t solely obtain historic car information but additionally add malware to linked web sites, amplifying the risk to operational safety. The invention emphasised poor key administration practices in client-facing functions.

Compounding the dangers, E-Dukaan’s code included a backdoor to Tableau dashboards, enabling passwordless logins as any person, together with the server admin, through a “trusted token” mechanism.

This granted full entry to inside tasks, monetary experiences, supplier scorecards, and information on over 8,000 customers. Individually, an uncovered Azuga API key within the check drive web site’s JavaScript compromised fleet administration for demonstration automobiles, probably revealing real-time location monitoring. Zveare halted deeper probes to keep away from information exfiltration, confirming no malicious exercise throughout testing.​

The vulnerabilities had been reported by India’s CERT-In on August 8, 2023, however remediation dragged on till January 2024 amid repeated follow-ups. Tata Motors confirmed fixes in 2023 with out notifying affected events, elevating questions on transparency.

As India’s largest automaker, working in 125 nations, such lapses erode belief in information dealing with for car house owners. Consultants urge enhanced code opinions and secret rotation to forestall future exposures.​

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AWS, Data, Drive, Exposed, Info, Keys, Leak, Motors, Sensitive, Tata, Test

Post navigation

Previous Post: Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing
Next Post: New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Related Posts

CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild Cyber Security News
Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information Cyber Security News
Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites Cyber Security News
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment Cyber Security News
Securing Generative AI – Mitigating Data Leakage Risks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 
  • New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection
  • New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
  • Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys
  • Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 
  • New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection
  • New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
  • Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys
  • Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News