Exclusive Webinar Alert! : Defending Against Sophisticated Threats in the Digital Economy Register Now

×

#1 Trending Cybersecurity News & Magazine

We are Hiring!
Wednesday, December 18, 2024
The Cyber Express
No Result
View All Result
Free Newsletter
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Playbook

    CISA and ONCD Push Cybersecurity for Federal Grants with New Playbook

    top cyberattacks of 2024

    Top 10 Cyberattacks in 2024 that Stole the Spotlight

    NoviSpy Android spyware infection process

    New Android Spyware Detected in Serbian Surveillance Investigation

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    Telecom Namibia cyberattack

    Telecom Namibia Hit by Massive Cyberattack: Over 400,000 Files Leaked

    Rhode Island cyberattack

    Cyberattack Targets Rhode Island’s RIBridges System, Compromising Sensitive Resident Information

    Human Machine Interfaces

    CISA and EPA Warn: Internet-Exposed HMIs Pose Serious Cybersecurity Risks to Water Systems

    Wire Fraud

    Nigerian Cyber Criminal Extradited to Nebraska for Multi-Million Dollar Fraud Scheme

    Cyber Resiliency toolkit

    CISA Enhances Public Safety Communications with New Resources in Cyber Resiliency Toolkit

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Generated AI

    Voice Cloning, Fake Videos & More: AI Is Making Scams Unstoppable

    Holiday season

    Tis the Season for Scammers: How to Stay Cyber Safe This Holiday

    AI red teaming

    AI Red Teaming in Focus: Why CISA Advocates a Secure by Design Approach

    Operation Serengiti Arrests

    Major Cybercrime Operation Nets Over 1,000 Arrests Across Africa

    phishing

    USDA’s FIDO Rollout: A Case Study in Phishing-Resistant MFA

    ANOM Sentencing

    Distributor of ANOM Encrypted Devices Sentenced to Over 5 Years in Prison

    Phobos Ransomware, Phobos, DOJ, Department of Justice, Ransomware, Cybercriminal, Indictment, Evgenii Ptitsyn

    U.S. Extradites and Charges Alleged Phobos Ransomware Admin

    Abandon X, Elon Musk, Hate Speech, Platform X, FC St. Pauli, The Guardian

    European Club and Media Giant Abandon X Amid Growing Hate Speech Concerns

    HHS, GAO, Cybersecurity, Cybersecurity Gaps, Cybersecurity Gaps in Healthcare, Healthcare, Government Accountability Office

    GAO Finds Persistent Gaps in HHS Cybersecurity Efforts in U.S. Healthcare

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

    Streaming Platforms

    Protect Your Streaming Accounts Now Before It’s Too Late

    KnowBe4

    KnowBe4 Uncovers Fake Employee: How a North Korean Hacker Was Hired into the Team

    CTO Strategies for Dark Web Threats

    Protecting Telecom Networks: CTO Strategies for Dark Web Threats

    Windows BSOD Error

    How to Fix the Windows ‘Blue Screen of Death’ Issue Caused by CrowdStrike

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Cyble

    Cyble Strengthens Regional Cyber Resilience with Infratech Partnership at Black Hat MEA 2024

    Cyber warfare

    Can AI Save the UK from a Cyber Catastrophe? The Fight Against Russian Hackers

    AI in cybersecurity

    AI in Cybersecurity Market Set for Explosive Growth, Projected to Reach $154.8 Billion by 2032

    EYI acquisition

    EY Identity Acquires J Group Consulting to Strengthen Privileged Access Management

    Chinese Threat Actor

    North Korea’s Cyber Evolution and China’s Storm-2077 Unveiled by Microsoft Analysts

    Google Chrome

    DOJ Orders Google to Sell Chrome to End Search Monopoly: A Possible Game-Changer for Competition

    IGT Cyberattack

    Major Cyberattack Targets Gambling Giant IGT, Systems Taken Offline

    Zoom Vulnerabilities

    CERT-In Flags Critical Vulnerabilities in Zoom: Update Your Apps Now

    PopeyeTools Website

    DOJ Takes Down Global Cybercrime Hub PopeyeTools, Seizes Cryptocurrency

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Playbook

    CISA and ONCD Push Cybersecurity for Federal Grants with New Playbook

    top cyberattacks of 2024

    Top 10 Cyberattacks in 2024 that Stole the Spotlight

    NoviSpy Android spyware infection process

    New Android Spyware Detected in Serbian Surveillance Investigation

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    Telecom Namibia cyberattack

    Telecom Namibia Hit by Massive Cyberattack: Over 400,000 Files Leaked

    Rhode Island cyberattack

    Cyberattack Targets Rhode Island’s RIBridges System, Compromising Sensitive Resident Information

    Human Machine Interfaces

    CISA and EPA Warn: Internet-Exposed HMIs Pose Serious Cybersecurity Risks to Water Systems

    Wire Fraud

    Nigerian Cyber Criminal Extradited to Nebraska for Multi-Million Dollar Fraud Scheme

    Cyber Resiliency toolkit

    CISA Enhances Public Safety Communications with New Resources in Cyber Resiliency Toolkit

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Generated AI

    Voice Cloning, Fake Videos & More: AI Is Making Scams Unstoppable

    Holiday season

    Tis the Season for Scammers: How to Stay Cyber Safe This Holiday

    AI red teaming

    AI Red Teaming in Focus: Why CISA Advocates a Secure by Design Approach

    Operation Serengiti Arrests

    Major Cybercrime Operation Nets Over 1,000 Arrests Across Africa

    phishing

    USDA’s FIDO Rollout: A Case Study in Phishing-Resistant MFA

    ANOM Sentencing

    Distributor of ANOM Encrypted Devices Sentenced to Over 5 Years in Prison

    Phobos Ransomware, Phobos, DOJ, Department of Justice, Ransomware, Cybercriminal, Indictment, Evgenii Ptitsyn

    U.S. Extradites and Charges Alleged Phobos Ransomware Admin

    Abandon X, Elon Musk, Hate Speech, Platform X, FC St. Pauli, The Guardian

    European Club and Media Giant Abandon X Amid Growing Hate Speech Concerns

    HHS, GAO, Cybersecurity, Cybersecurity Gaps, Cybersecurity Gaps in Healthcare, Healthcare, Government Accountability Office

    GAO Finds Persistent Gaps in HHS Cybersecurity Efforts in U.S. Healthcare

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

    Streaming Platforms

    Protect Your Streaming Accounts Now Before It’s Too Late

    KnowBe4

    KnowBe4 Uncovers Fake Employee: How a North Korean Hacker Was Hired into the Team

    CTO Strategies for Dark Web Threats

    Protecting Telecom Networks: CTO Strategies for Dark Web Threats

    Windows BSOD Error

    How to Fix the Windows ‘Blue Screen of Death’ Issue Caused by CrowdStrike

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Cyble

    Cyble Strengthens Regional Cyber Resilience with Infratech Partnership at Black Hat MEA 2024

    Cyber warfare

    Can AI Save the UK from a Cyber Catastrophe? The Fight Against Russian Hackers

    AI in cybersecurity

    AI in Cybersecurity Market Set for Explosive Growth, Projected to Reach $154.8 Billion by 2032

    EYI acquisition

    EY Identity Acquires J Group Consulting to Strengthen Privileged Access Management

    Chinese Threat Actor

    North Korea’s Cyber Evolution and China’s Storm-2077 Unveiled by Microsoft Analysts

    Google Chrome

    DOJ Orders Google to Sell Chrome to End Search Monopoly: A Possible Game-Changer for Competition

    IGT Cyberattack

    Major Cyberattack Targets Gambling Giant IGT, Systems Taken Offline

    Zoom Vulnerabilities

    CERT-In Flags Critical Vulnerabilities in Zoom: Update Your Apps Now

    PopeyeTools Website

    DOJ Takes Down Global Cybercrime Hub PopeyeTools, Seizes Cryptocurrency

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express by Cyble
No Result
View All Result
TRENDING
TARGETED INDUSTRIES -> IT & ITES | Technology | Government & LEA | Healthcare | BFSITARGETED COUNTRIES -> United States | Russian Federation | China | United Kingdom | GermanyTARGETED REGIONS -> North America (NA) | Europe & UK | Asia & Pacific (APAC) | Middle East & Africa (MEA) | Australia and New Zealand (ANZ)IOCs -> a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91 | 7bdbd180c081fa63ca94f9c22c457376 | c67b03c0a91eaefffd2f2c79b5c26a2648b8d3c19a22cadf35453455ff08ead0 | 8c69830a50fb85d8a794fa46643493b2 | bbcf7a68f4164a9f5f5cb2d9f30d9790CVEs -> CVE-2024-21887 | CVE-2023-46805 | CVE-2017-11882 | CVE-2024-21893 | CVE-2021-44228TECHNIQUES -> T1082 | T1140 | T1486 | T1083 | T1105TACTICS -> TA505 | TA0011 | TA0002 | TA0001 | TA453TAGS -> security | the-cyber-express | firewall-daily | the-cyber-express-news | malwareTHREAT ACTORS -> Lockbit | Blackcat | Lazarus | VoltTyphoon | KimsukyMALWARE -> CobaltStrike | Qakbot | Xmrig | Lockbit | IcedidSOURCES -> Darkreading | The Cyber Express | Bleepingcomputer | The Hacker News | Infosecurity Magazine

National Automobile Dealers Association Cyberattack: Sensitive Data Allegedly Leaked

The threat actor advertises databases containing sensitive customer information on the Breachforums platform.

by Ashish Khaitan
January 8, 2024
Reading Time: 3 mins read
National Automobile Dealers Association cyberattack
Share on LinkedInShare on Twitter

The notorious IntelBroker hacker group has set its sights on the National Automobile Dealers Association (NADA), a prominent American trade organization representing franchised new car and truck dealerships.

The alleged National Automobile Dealers Association cyberattack, first reported on January 7, 2024, was published on a popular dark web form where the threat actors have claimed substantial amounts of data related to the US-based organization. 

The threat actor advertises databases containing sensitive customer information on the Breachforums platform. The actor, operating under the alias ‘IntelBroker,’ posted on the hacker forum, revealing the compromise of five distinct databases related to NADA. 

The National Automobile Dealers Association (NADA), founded in 1917 and headquartered in Tysons Corner, Virginia, is a notable American trade organization. It represents approximately 16,500 franchised dealers of new cars and trucks, including both domestic and international brands.

The National Automobile Dealers Association Cyberattack

National Automobile Dealers Association Cyberattack
Source: Twitter

The databases contained in this National Automobile Dealers Association cyberattack, include specific customer information, including Customer Phone (300K lines), Customer Payments (58K lines), Customer Invoices (81K lines), Customer Emails (108K lines), and Customer Cards (518K lines). 

Furthermore, the threat actors have not shared any ransom demands for the databases, adding more mystery to their claims and the intention behind the cyberattack on NADA.

Your browser does not support the video tag.

Moreover, the primary victim of this cyberattack is the National Automobile Dealers Association, a critical entity in the American automotive sector. The repercussions extend to the United States, particularly in the North American region.

The Cyber Express reached out to the National Automobile Dealers Association for more information and clarification. However, as of the time of writing, no official statement or response has been issued by the organization. This lack of confirmation leaves the claims regarding the National Automobile Dealers Association cyberattack unverified.

Who is the IntelBroker hacker group?

The cyber assailant, known as IntelBroker, has gained notoriety on Breachforums. The hacker group has boldly advertised the compromised databases in this cyberattack on NADA, showcasing their capabilities and demonstrating the urgency of addressing cybersecurity vulnerabilities.

Last year, in a similar incident, General Electric found itself under potential threat as IntelBroker, linked to the CyberNiggers group, asserted unauthorized access to confidential military projects and information pertaining to the US government’s defense R&D agency, DARPA. 

This revelation comes as IntelBroker attempted to sell network access on a hacker forum for $500. The compromised data for sale includes SQL database files, military documents, aviation system technical details, and maintenance reports. This incident mirrors a previous one from last year when General Electric initiated an investigation into data breach claims made by IntelBroker. 

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Ashish Khaitan

Ashish Khaitan

Ashish is a technical writer at The Cyber Express. He adores writing about the latest technologies and covering the latest cybersecurity events. In his free time, he likes to play horror and open-world video games.

Next Post
SPARSH Portal data leak

TCE Exclusive: Massive Data Leak at India's SPARSH Pension Portal Puts Defense Personnel at Risk

Your browser does not support the video tag.


Follow Us On Google News

Latest Issue is Out. Subscribe Now

Cybersecurity Magazine

Latest Cyber News

Playbook
Cyber News

CISA and ONCD Push Cybersecurity for Federal Grants with New Playbook

December 18, 2024
top cyberattacks of 2024
Firewall Daily

Top 10 Cyberattacks in 2024 that Stole the Spotlight

December 18, 2024
NoviSpy Android spyware infection process
Cyber News

New Android Spyware Detected in Serbian Surveillance Investigation

December 17, 2024
Healthcare cybersecurity trends of 2024
Firewall Daily

Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

December 17, 2024

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information
 

Subscribe to Daily News

Stay ahead of the curve with The Cyber Express’s Daily News! Our newsletter delivers the latest cybersecurity headlines, expert insights, and critical updates straight to your inbox every morning. From breaking news and in-depth analysis to emerging threats and industry trends, our curated content ensures you’re always informed and prepared.

Facebook Twitter LinkedIn

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

© 2022 - 2024 The Cyber Express by Cyble. All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2022 - 2024 The Cyber Express by Cyble. All Rights Reserved

Hacker News by The Cyber Express
Sithembile (Nkosi) Songo

Sithembile (Nkosi) Songo
CISO
ESKOM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information