Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft

Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft

Posted on August 11, 2025August 11, 2025 By CWS

Vulnerabilities found by a researcher in a significant automaker’s dealership techniques may have been exploited to remotely hack automobiles and procure private info.

The analysis was summarized over the weekend by Eaton Zveare, researcher at Traceable, on the DEF CON hacking convention. The researcher instructed SecurityWeek that he’ll quickly publish a weblog publish detailing the findings. 

Lately, Zveare discovered vulnerabilities within the on-line platforms of a number of main automotive producers, together with Honda and Toyota.

His newest analysis targeted on a web based platform utilized by greater than 1,000 US dealerships belonging to an unnamed carmaker. The platform can be utilized to order automobiles, make gross sales, and handle prospects. Whereas it’s accessible over the web, automotive dealership workers want an invitation with the intention to register an account. 

Nevertheless, the researcher was capable of finding the account registration type even with out an invite, and abused a profile updating performance together with API vulnerabilities to create a ‘nationwide admin’ account that gave him full entry to the platform.

[ Read: Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking ]

Zveare seen that the platform allowed sellers to lookup a car based mostly on the client’s identify or the automotive’s VIN. With the assistance of a good friend who owns a car made by the affected carmaker, he performed some assessments and located that he was in a position to abuse the platform to switch the possession of the car to a newly created account.

Along with his account tied to the focused automotive, Zveare was in a position to make use of the related cellular software to remotely monitor the car’s location, unlock it, and begin the engine. Commercial. Scroll to proceed studying.

The researcher believes the assault would have labored in opposition to any automotive mannequin made since 2012 so long as it had a normal telematics module. The attacker solely wanted to know the sufferer’s identify. 

Additional analysis led to the invention of various portals utilized by the identical model — together with for loaner automobiles — on which Zveare additionally managed to acquire elevated privileges, which granted him entry to buyer and worker private info, contracts, monetary paperwork, automotive monitoring, and different inside performance. 

Traceable, which makes a speciality of software and API safety, instructed SecurityWeek that the identify of the impacted automaker is just not being shared, however the firm did handle the vulnerabilities after being notified.

“The objective of this analysis is to not name out one firm — it’s to spotlight broader, systemic dangers in dealer-manufacturer platforms that always fly beneath the radar. Naming names shifts the dialog away from what actually issues: bettering safety throughout the trade,” Traceable stated.

Associated: Hundreds of thousands of Vehicles Uncovered to Distant Hacking through PerfektBlue Assault

Associated: Nissan Leaf Hacked for Distant Spying, Bodily Takeover

Associated: Subaru Starlink Vulnerability Uncovered Vehicles to Distant Hacking

Security Week News Tags:Allowed, Automakers, Car, Data, Dealership, Flaws, Hacking, Major, Personal, Systems, Theft

Post navigation

Previous Post: Focusing Security Where Business Value Lives
Next Post: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More

Related Posts

Shai-Hulud Supply Chain Attack Led to .5 Million Trust Wallet Heist Shai-Hulud Supply Chain Attack Led to $8.5 Million Trust Wallet Heist Security Week News
Novel 5G Attack Bypasses Need for Malicious Base Station Novel 5G Attack Bypasses Need for Malicious Base Station Security Week News
RegScale Raises  Million for GRC Platform RegScale Raises $30 Million for GRC Platform Security Week News
Nick Andersen Steps Up as Acting CISA Director Nick Andersen Steps Up as Acting CISA Director Security Week News
Iranian Hackers Target Defense and Government Officials in Ongoing Campaign Iranian Hackers Target Defense and Government Officials in Ongoing Campaign Security Week News
Hugging Face Abused to Deploy Android RAT Hugging Face Abused to Deploy Android RAT Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark