Post Now
Image

Nissan North America, source code leaked online after the company left exposed one of its Git servers protected with default access credentials.

Nissan North America, source code leaked online after the company left exposed one of its Git servers protected with default access credentials.

A Swiss-based software engineer, Tillie Kottmann, learned of the leak from an anonymous source informing them of the server and the admin/admin access credentials. The leak originated from a Git server that was left exposed on the internet. 

The entire compilation consists of around 20 gigabytes and contains source code for mobile apps and various tools used by the company internally for diagnostics, market research, client acquisition, or NissanConnect services.

Tillie Kottmann who retains a repository of leaked source code from various sources analysed the Nissan data on Monday, posted a summary of the leak:

  • Nissan NA Mobile apps
  • Parts of the ASIST Diagnostic System software
  • Dealer Business Systems/Dealer Portal
  • Nissan internal core movie library
  • Nissan/Infiniti NCAR/ICAR services
  • Client acquisition and retention tools
  • Sale/market research tools and data
  • Various marketing tools
  • Vehicle logistics portal
  • Vehicle connected services/Nissan connect things
  • Various other backends and internal tools

The insecure server was taken offline after the data circulated in the form of torrent links shared on hacking forums and Telegram channels.

“Nissan conducted an immediate investigation regarding improper access to proprietary company source code. We take this matter seriously and are confident that no personal data from consumers, dealers or employees was accessible with this security incident. The affected system has been secured, and we are confident that there is no information in the exposed source code that would put consumers or their vehicles at risk, ” the company told ZDNet in an email.

For the latest cyber threats and the latest hacking news please follow us on FacebookLinkedin, and Twitter.

You may be interested in reading: How to Survive the COVID Time Cyber ​​Security Threats?