Auto giant Stellantis investigating data breach following ‘unauthorized access’

The multinational carmaker Stellantis said unauthorized access to a third-party provider’s platform resulted in the potential exposure of customer data. 

In a statement released on Sunday, the company said the incident affected a provider supporting the North American branch’s customer service.

“The personal information involved was limited to contact information,” Stellantis said. “Importantly, the affected platform does not store financial or sensitive personal information, and none was accessed.”   

The company did not respond to a request for comment. Stellantis, whose North American headquarters are in Auburn Hills, Michigan, owns more than a dozen automobile brands, including Chrysler, Jeep, Peugeot and Dodge. It reported more than $87 billion in revenues in the first quarter of 2025. 

Stellantis’ breach disclosure coincides with a major incident affecting Jaguar Land Rover’s manufacturing, which announced last week that its global operations would remain shuttered until at least September 24 following a cyberattack.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

James Reddick

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.

 

Total
0
Shares
Previous Post

ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

Next Post

Alleged Scattered Spider member turns self in to Las Vegas police

Related Posts

Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

Google's artificial intelligence (AI)-powered cybersecurity agent called Big Sleep has been credited by Apple for discovering as many as five different security flaws in the WebKit component used in its Safari web browser that, if successfully exploited, could result in a browser crash or memory corruption. The list of vulnerabilities is as follows - CVE-2025-43429 - A buffer overflow
Read More

BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a Chinese-speaking threat actor using a malware called BadIIS in attacks targeting East and Southeast Asia, particularly with a focus on Vietnam. The activity, dubbed Operation Rewrite, is being tracked by Palo Alto Networks Unit 42 under the moniker CL-UNK-1037, where "
Read More

Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices

Cybersecurity researchers are calling attention to a spike in automated attacks targeting PHP servers, IoT devices, and cloud gateways by various botnets such as Mirai, Gafgyt, and Mozi. "These automated campaigns exploit known CVE vulnerabilities and cloud misconfigurations to gain control over exposed systems and expand botnet networks," the Qualys Threat Research Unit (TRU) said in a report
Read More