Perimeter

12/27/2017
01:30 PM
50%
50%

Nissan Canada Finance Alerts 1.13 Million Customers of Data Breach

Attackers gain access to personal information of Nissan Canada Finance and Infiniti Financial Services Canada customers.

Nissan Canada Finance (NCF) is notifying 1.13 million customers that their personal information may be at risk following a data breach of its operations.

The organization, which is still determining the number of people affected by the breach, is contacting all current and former customers who financed their vehicles through NCF or Infiniti Financial Services Canada, NCF said in a statement.

Customers' names, addresses, vehicle make, model, and identification numbers, credit scores, loan amounts, and monthly payment schedules may have been accessed in the breach, NCF stated. The company said no payment card information was accessed and the breach appears to only affect its Canadian customers.

NCF is offering customers 12 months of complimentary credit monitoring services through TransUnion. It is also working with data security experts and law enforcement to further investigate the breach.

Read more about NCF's data breach here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/30/2017 | 12:35:24 PM
NCF is offering customers 12 months of complimentary credit monitoring services
This is a positive notion, however aside from Nissan proprietary information specific to the individual this information could not be used to create other lines of credit in and of themselves. The rest of the datasets are publicly accessible. 
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.