Toyota Financial Services has confirmed that it detected unauthorized access on some of its systems in Europe and Africa after Medusa ransomware claimed an attack on the company. Toyota Financial Services, a subsidiary of Toyota Motor Corporation, is a global entity with a presence in 90% of the markets where Toyota sells its cars, providing auto financing to its customers. Earlier today, the Medusa ransomware gang listed TFS to its data leak site on the dark web, demanding a payment of $8,000,000 to delete data allegedly stolen from the Japanese company. The threat actors gave Toyota 10 days to respond, with the option to extend the deadline for $10,000 per day. While Toyota Finance did not confirm if data was stolen in the attack, the threat actors claim to have exfiltrated files and threaten with a data leak if a ransom is not paid. To prove the intrusion, the hackers published sample data that includes financial documents, spreadsheets, purchase invoices, hashed account passwords, cleartext user IDs and passwords, agreements, passport scans, internal organization charts, financial performance reports, staff email addresses, and more. Medusa also provides a.TXT file with the file tree structure of all the data they claim to have stolen from Toyota's systems. Most of the documents are in German, indicating that the hackers managed to access systems serving Toyota's operations in Central Europe. "Toyota Financial Services Europe & Africa recently identified unauthorized activity on systems in a limited number of its locations." "We took certain systems offline to investigate this activity and to reduce risk and have also begun working with law enforcement." "As of now, this incident is limited to Toyota Financial Services Europe & Africa." Regarding the status of the impacted systems and their estimated return to normal operations, the spokesperson told us that the process of bringing systems back online is already underway in most countries. Earlier today, following Medusa's disclosure of TFS as their victim, security analyst Kevin Beaumont highlighted that the firm's German office had an internet-exposed Citrix Gateway endpoint which had not been updated since August 2023, indicating that it was vulnerable to the critical Citrix Bleed security issue. A few days back, it was confirmed that Lockbit ransomware operatives were using publicly available exploits for Citrix Bleed to achieve breaches against the Industrial and Commercial Bank of China, DP World, Allen & Overy, and Boeing. It is possible that other ransomware groups have started to exploit Citrix Bleed, taking advantage of the massive attack surface estimated to count several thousand endpoints. LockBit ransomware exploits Citrix Bleed in attacks, 10K servers exposed. Ransomware gang files SEC complaint over victim's undisclosed breach. Toronto Public Library confirms data stolen in ransomware attack. FBI and CISA warn of opportunistic Rhysida ransomware attacks. FBI: Royal ransomware asked 350 victims to pay $275 million.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 30 Nov 2023 23:19:27 +0000