Loading…

Our Blog

Find the latest updates of Link3 in our blog.

Data breach exposes trade secrets of carmakers GM, Ford, Tesla, Toyota

Security researcher UpGuard Cyber Risk disclosed Friday that sensitive documents from more than 100 manufacturing companies, including GM, Fiat Chrysler, Ford, Tesla,  Toyota, ThyssenKrupp, and VW were exposed on a publicly accessible server belonging to Level One Robotics.
The exposure via Level One Robotics, which provides industrial automation services, came through rsync, a common file transfer protocol that’s used to backup large data sets, according to UpGuard Cyber Risk. The data breach was first reported by the New York Times.
According to the security researchers, restrictions weren’t placed on the rsync server. This means that any rsync client that connected to the rsync port had access to download this data. UpGuard Cyber Risk published its account of how it discovered the data breach to show how a company within a supply chain can affect large companies with seemingly tight security protocols.
This means if someone knew where to look they could access trade secrets closely protected by automakers. It’s unclear if any nefarious actors actually got their hands on the data. At least one source at an affected automaker told TechCrunch it doesn’t not appear that sensitive or proprietary data was exposed.
UpGuard’s big takeaway in all of this: rsync instances should be restricted by IP address. The researchers also suggest that user access to rsync be set up so that clients have to authenticate before receiving the dataset. Without these measures, rsync is publicly accessible, the researchers said.
The breach exposed 157 gigabytes of data—a treasure trove of 10 years of assembly line schematics, factory floor plans and layouts, robotic configurations and documentation, ID badge request forms, VPN access request forms. The breach even included sensitive non-disclose agreements, including one from Tesla.
Personal details of some Level One employees, including scans of driver’s licenses and passports, and Level One business data, including invoices, contracts, and bank account details.
The security team discovered the breach July 1. The company successfully reached Level One by July 9 and the exposure was closed by the following day.

YOU MIGHT ALSO LIKE

  • These days, wonders are just like any other thing in ...

  • On this Wednesday, 10th October, BBC faced a technical glitch ...

  • In order to help one of the social media sites ...

  • By now we are all very familiar with viruses and ...

Archives

  • “Fully loaded Kodi boxes” are in vogue in many countries ...

  • iPhone has been using chip made by world’s biggest producer ...

  • The report has been spread that the employees of Amazon ...

  • For more than a year, an undisclosed number of users’ ...

  • The world’s number one Go player Ke Jie got defeated ...

  • It’s been a great disappointment spread among the mass number ...

  • Few months back a report came out about Samsung’s Galaxy ...

  • A product with became the most profitable in history right ...

  • Online gaming community in Bangladesh has grown quite a lot ...

  • In Chicago, a festival had been arranged by Pokemon Go ...