Rephrase the title:Hackers Target Nissan’s Systems in Australia New Zealand in the Latest Cyberattack

Health

Rephrase and rearrange the whole content into a news article. I want you to respond only in language English. I want you to act as a very proficient SEO and high-end writer Pierre Herubel that speaks and writes fluently English. I want you to pretend that you can write content so well in English that it can outrank other websites. Make sure there is zero plagiarism.:

Nissan, a popular car manufacturer based in Japan, is the latest company to get hit by a cyberattack. According to several reports, the automaker’s systems in Australia and New Zealand were affected by the data breach.

The cyber incident, which targeted the Oceania division of Nissan, is assigned to the sales, marketing, and services in the country. This alarmed the company about the personal information that might have been leaked during the attack.

Nissan Encounters Data Breach

Hackers Target Nissan's Systems in Australia, New Zealand in Latest Cyberattack

(Photo : John Cameron from Unsplash)
Automaker Nissan is currently the subject of a recent cyberattack. Recent reports point out that hackers attacked its systems in New Zealand and Australia.

In a report by Bleeping Computer, Nissan has warned that customers should be careful when clicking their websites. If they are careless in visiting third-party sites of the company with “nissan.com.au” and “nissan.co.nz,” stay away from them for now.

As of writing, the details behind the cyberattack remained undisclosed. However, Nissan made sure that the exposed data will not be further compromised since scams are everywhere in the aftermath of the cyberattack.

Related Article: Nissan, Kia Cars Secretly Tracking Drivers’ Sex Lives, Raises Privacy Concerns

Nissan Takes Proactive Steps to Mitigate Risks

Nissan has mobilized its global incident response team to assess the extent of the cyberattack’s impact. Acknowledging the significant risk of customer data compromise, the company is taking proactive measures to address potential scams and account hijacking threats.

“Nissan is working with its global incident response team and relevant stakeholders to investigate the extent of the incident and whether any personal information has been accessed,” Nissan Oceania wrote in a statement.

Website Functionality Unaffected, Restoration in Progress

Despite the cyber incident, Nissan assures customers that the functionality of its websites remains intact. The company is actively working to restore the affected systems. 

While urging patience from customers during this restoration process, Nissan emphasizes that its dealer network remains unaffected, ensuring uninterrupted processing of vehicle and service inquiries.

Government Notification and Cyber Resilience

Nissan has promptly notified government agencies in Australia and New Zealand, including the Cyber Security Centre, about the cyber incident. The proactive approach aligns with collaborative efforts to enhance cyber resilience in the region. As of now, there are no official statements from the concerned government agencies.

Cyberattacks in cars or any vehicles are becoming more uncommon as hackers devise more plans to bypass security systems.

One prime example of the incident intensifying this statement is the cyberattack that hit the networks of self-driving and UAVs (unmanned aerial vehicles).

Because vehicles are easy targets of security attacks, security experts came up with an effective method to detect attacks that happen in real-time.

Elsewhere, North Korean threat actors launched a macOS malware campaign that is known to pass through security filters.

According to our previous report, the group behind the RustBucket scheme is believed to be linked to Lazarus Group. This notorious group of cybercriminals collaborated with APT38 to steal $620 worth of Ethereum. At that time, the valuation of the stolen crypto during the heist had skyrocketed by 40%.

Read Also: Okta Data Breach Update: Hackers Accessed Info on All Customers, Not Just 1% as Initially Stated

Joseph Henry

ⓒ 2023 TECHTIMES.com All rights reserved. Do not reproduce without permission.