The early morning of February 21, a file of about 6.1 GB was leaked on the dark web and in public forums, which, according to the publication itself, contained more than 12 million records linked to users of CarGurus, the American digital platform to search, compare and contact vendors of new and new vehicles. If the attribution is confirmed, we would be faced with one of the most important mass leaks affecting a service with tens of millions of monthly visits and thus a lot of sensitive information about buyers, sellers and dealers.
The database was added by the monitoring service Have I Been Pwned (HIBP), which maintains a public repository of incidents and allows people to check if their emails have been exposed. HIBP listed the incident on its CarGurus page and, according to its initial observations, the set includes from e-mail addresses and phone numbers to physical addresses, account identifiers, data related to pre-qualification requests and the results of those requests, and even details of concessionaire accounts and subscriptions. The HIBP tab is available here: Have I Been Pwned - CarGurus.

An important clarification: CarGurus has not yet issued a public statement confirming an intrusion into its systems and has not received requests for comments from various media. However, HIBP usually does basic checks on the authenticity of the samples before incorporating a dataset into its index, which brings some truth to the finding. In addition, in a HIBP tweet, it was noted that approximately 70% of these records were already based on previous incidents, so that the "new" data would be around 3.7 million accounts - a detail that HIBP publicly reported -: communicated on X / Twitter by HIBP.
The publication was attributed to the group known as ShinyHunters, a group that in recent years has become notorious for claiming the authority of multiple leaks and for using extortion tactics when it does not get what it requires. Recent incidents include gaps in companies in various sectors, from telecommunications and advertising technology to fashion brands, catering services and music platforms. For researchers and security officials it is clear that the group's activity is not timely: ShinyHunters has specialized in exfiltering data and, when negotiation fails, publishing records to force or punish the victim.
In terms of methodology, incident analysis reports relating to ShinyHunters indicate that many intrusions begin with social engineering: calls to employees, voice phishing techniques and links to credentials capture pages that allow access to corporate SaaS services. From there, attackers often take advantage of access to platforms such as Salesforce, Okta or Microsoft 365 to navigate and extract customer tables. They have sometimes used malicious OAuth applications that, once authorized by an unprevented user, provide API-level access to internal data, which facilitates massive extraction without the need to exploit complex technical vulnerabilities.
The public availability of the file poses immediate risks to the people concerned. With emails, phones, addresses and partial financial details, attackers can design highly personalized phishing campaigns, run targeted fraud, attempt SIM swap attacks to kidnap phone numbers or, at worst, mount identity suplantations for financial operations. Filtered information not only facilitates opportunistic fraud, but also reduces barriers to more sophisticated and targeted attacks.
If you are a CarGurus user or think your information might be in the lot, it is appropriate to act with caution and speed. First, check HIBP if your mail is on the list and take note of any indicator you find. It then reviews unusual movements in your financial accounts and activates or strengthens the authentication of two factors in the services you use; where possible, it avoids SMS-based methods and opts for app authentication or physical keys. Do not ignore calls or messages that ask to confirm personal data or address you to unexpected links; before following any instruction, contact the entity directly via official channels. In parallel, it is appropriate to change passwords if you share credentials between different services and, if you manage commercial data or represent a concessionaire, alert your security team to audit access and review possible compromised SaaS integrations.
For companies, the episode is a reminder that the defense goes through a combination of technology and training. Beyond patches and access controls, It is essential to invest in awareness-raising against social engineering, review OAuth permissions and monitor abnormal extraction patterns in APIs and privileged accounts. Service providers should also have clear communication processes with users and regulators where there is a suspicion of mass data exposure.

This event also raises questions about accountability and transparency: when platforms with a high volume of traffic and personal data are involved in leaks, customers and regulatory authorities expect detailed explanations and concrete measures. As long as CarGurus does not publish his own forensic investigation, the cybersecurity community will continue to rely on public samples and external analysis to assess the actual extent of the damage.
Ultimately, attacks such as the one attributed to ShinyHunters recall that personal data still have a market and that any exposed information can become fraud ammunition. The best defense is caution: check, update, monitor and not assume that a mail or call is legitimate just because it seems to come from a known company.
Recommended references and readings: the record of Have I Been Pwned about CarGurus He's here. and the specialized media report that documented the appearance of the file is available on BleepingComputer ( BleepingComputer - related news), in addition to the HIBP information tweet in this link.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

Mini Shai-Hulud: the attack that turned the dependencies into mass intrusion vectors
Summary of the incident: GitHub investigates unauthorized access to internal repositories after the actor known as TeamPCP put the alleged source code and internal platform orga...

Fox Temper exposes the fragility of digital signature in the cloud
Microsoft's disclosure of the operation of "malware-signing-as-a-service" known as Fox Temper replaces in the center the most critical vulnerability of the modern software ecosy...

Trapdoor: the maldumping operation that turned Android apps into an automatic illicit income factory
Cybersecurity researchers have discovered an operation of maldumping and mobile advertising fraud named as Trapdoor, which turns legitimate Android application facilities into a...

From warning to orchestration and IA action to accelerate response to network incidents
IT and security teams live a well-known reality: a constant flood of alerts from monitoring platforms, infrastructure systems, identity services, ticketing tools and security so...

Nx Console in check: how a productivity extension became a credentials theft and a threat to the supply chain
An attack directed at developers again revealed the fragility of the software supply chain: the Nx Console extension for editors such as Visual Studio Code, with more than 2.2 m...