Drivesure Data Breach

Drivesure, a dealership service provider, was the victim of an attack on its database in December of last year. The result was that 26GB of private information was downloaded and shared via hacking forums. The data set that was hacked contained names addresses, addresses, and phone numbers of 3.2 million buyers, as well as text messages and emails between the clients of traders vehicles, VINs of their vehicles, and service records. Also, more than 000 hashed passwords for bcrypt were made public. While bcrypt is considered stronger than older strategies like MD5 and SHA1, MD5 however, the hashes may still be used to brute-force passwords after they have been downloaded, according to Risk Based Security reports.

In a lengthy blog post on Raidforums the hacker “pompompurin” explained the leak of user information and files. This is atypical, since hackers usually only share valuable sections or reduced versions of the databases they’ve discovered.

According to CISO Magazine, the database was exposed due to a mistake in an AWS bucket that was being used by the company. The AWS bucket was left unprotected for a period of time, which allowed anyone to access the database and its contents, including more than one million unique email addresses as well as passwords that were stored in plaintext, and encrypted with bcrypt.

The breach is a major concern for those who use drivesure, because they are at risk of becoming victims of identity fraud or theft if their details are stolen. Anyone who uses the site should immediately change their passwords. Additionally, they should consider changing their login information on other websites using the same credentials.