ShinyHunters attributes mass filtration to CarGurus that exposes data from millions of users

Published 5 min de lectura 252 reading

The early morning of February 21, a file of about 6.1 GB was leaked on the dark web and in public forums, which, according to the publication itself, contained more than 12 million records linked to users of CarGurus, the American digital platform to search, compare and contact vendors of new and new vehicles. If the attribution is confirmed, we would be faced with one of the most important mass leaks affecting a service with tens of millions of monthly visits and thus a lot of sensitive information about buyers, sellers and dealers.

The database was added by the monitoring service Have I Been Pwned (HIBP), which maintains a public repository of incidents and allows people to check if their emails have been exposed. HIBP listed the incident on its CarGurus page and, according to its initial observations, the set includes from e-mail addresses and phone numbers to physical addresses, account identifiers, data related to pre-qualification requests and the results of those requests, and even details of concessionaire accounts and subscriptions. The HIBP tab is available here: Have I Been Pwned - CarGurus.

ShinyHunters attributes mass filtration to CarGurus that exposes data from millions of users
Image generated with IA.

An important clarification: CarGurus has not yet issued a public statement confirming an intrusion into its systems and has not received requests for comments from various media. However, HIBP usually does basic checks on the authenticity of the samples before incorporating a dataset into its index, which brings some truth to the finding. In addition, in a HIBP tweet, it was noted that approximately 70% of these records were already based on previous incidents, so that the "new" data would be around 3.7 million accounts - a detail that HIBP publicly reported -: communicated on X / Twitter by HIBP.

The publication was attributed to the group known as ShinyHunters, a group that in recent years has become notorious for claiming the authority of multiple leaks and for using extortion tactics when it does not get what it requires. Recent incidents include gaps in companies in various sectors, from telecommunications and advertising technology to fashion brands, catering services and music platforms. For researchers and security officials it is clear that the group's activity is not timely: ShinyHunters has specialized in exfiltering data and, when negotiation fails, publishing records to force or punish the victim.

In terms of methodology, incident analysis reports relating to ShinyHunters indicate that many intrusions begin with social engineering: calls to employees, voice phishing techniques and links to credentials capture pages that allow access to corporate SaaS services. From there, attackers often take advantage of access to platforms such as Salesforce, Okta or Microsoft 365 to navigate and extract customer tables. They have sometimes used malicious OAuth applications that, once authorized by an unprevented user, provide API-level access to internal data, which facilitates massive extraction without the need to exploit complex technical vulnerabilities.

The public availability of the file poses immediate risks to the people concerned. With emails, phones, addresses and partial financial details, attackers can design highly personalized phishing campaigns, run targeted fraud, attempt SIM swap attacks to kidnap phone numbers or, at worst, mount identity suplantations for financial operations. Filtered information not only facilitates opportunistic fraud, but also reduces barriers to more sophisticated and targeted attacks.

If you are a CarGurus user or think your information might be in the lot, it is appropriate to act with caution and speed. First, check HIBP if your mail is on the list and take note of any indicator you find. It then reviews unusual movements in your financial accounts and activates or strengthens the authentication of two factors in the services you use; where possible, it avoids SMS-based methods and opts for app authentication or physical keys. Do not ignore calls or messages that ask to confirm personal data or address you to unexpected links; before following any instruction, contact the entity directly via official channels. In parallel, it is appropriate to change passwords if you share credentials between different services and, if you manage commercial data or represent a concessionaire, alert your security team to audit access and review possible compromised SaaS integrations.

For companies, the episode is a reminder that the defense goes through a combination of technology and training. Beyond patches and access controls, It is essential to invest in awareness-raising against social engineering, review OAuth permissions and monitor abnormal extraction patterns in APIs and privileged accounts. Service providers should also have clear communication processes with users and regulators where there is a suspicion of mass data exposure.

ShinyHunters attributes mass filtration to CarGurus that exposes data from millions of users
Image generated with IA.

This event also raises questions about accountability and transparency: when platforms with a high volume of traffic and personal data are involved in leaks, customers and regulatory authorities expect detailed explanations and concrete measures. As long as CarGurus does not publish his own forensic investigation, the cybersecurity community will continue to rely on public samples and external analysis to assess the actual extent of the damage.

Ultimately, attacks such as the one attributed to ShinyHunters recall that personal data still have a market and that any exposed information can become fraud ammunition. The best defense is caution: check, update, monitor and not assume that a mail or call is legitimate just because it seems to come from a known company.

Recommended references and readings: the record of Have I Been Pwned about CarGurus He's here. and the specialized media report that documented the appearance of the file is available on BleepingComputer ( BleepingComputer - related news), in addition to the HIBP information tweet in this link.

Coverage

Related

More news on the same subject.