Close Menu
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
What's Hot

Robinhood is rolling out NFL parlay and prop bets on prediction markets platform

December 17, 2025

FDIC approves Erebor Bank’s deposit insurance application

December 17, 2025

An Opportunity to Give Back

December 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Smart SpendingSmart Spending
Subscribe
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
Smart SpendingSmart Spending
Home»Banking»How hackers stole vendor data on 6 million car buyers
Banking

How hackers stole vendor data on 6 million car buyers

December 16, 2025No Comments6 Mins Read
Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
How hackers stole vendor data on 6 million car buyers
Share
Facebook Twitter LinkedIn Pinterest Email

  • Key insight: The attacker gained access to 700Credit’s system by first compromising a third-party partner’s system in July, and then launching the data scraping attack months later.
  • Supporting data: The breach compromised names, Social Security numbers, and dates of birth for approximately 5.8 million consumers.
  • Forward look: Class action lawsuits have been filed, and 700Credit is providing credit monitoring while auto dealers review their vendor security.

Overview bullets generated by AI with editorial review

Processing Content

700Credit, a major credit check and compliance provider for the automotive lending industry, suffered a data breach exposing the sensitive financial information of nearly 6 million consumers, forcing auto dealers to navigate complex federal reporting requirements.

The Southfield, Michigan-based company discovered the attack on Oct. 25. An attacker exploited a vulnerability in an application programming interface, or API, that 700Credit used to grant partners access to financing data, according to Ken Hill, 700Credit managing director.

700Credit has since secured the API. It has also since dropped a partner the attacker had compromised in an effort to figure out how the API worked.

The breach compromised names, addresses, Social Security numbers and dates of birth for approximately 5.8 million people, according to a data breach notification 700Credit filed with the Office of the Maine Attorney General.

The incident highlights third-party vendor risks facing lenders. The attacker gained access to 700Credit’s data logs by compromising the dropped partner’s system as early as July, though the attack was not launched until late October.

How the vulnerability worked

The attacker, which 700Credit has not named, gained access to 700Credit’s API by first compromising the systems of a second, smaller partner back in July.

That firm, which 700Credit also has not named, provides outsourced finance and accounting services to small auto dealers that lack their own finance offices.

See also  Trump 'uncertainty' contributes to hawkish shift at Fed

The attacker accessed this unnamed partner’s communication logs, which revealed how the partner’s system communicated with 700Credit’s servers and gave the attacker access to credentials it could use to access the system.

The partner used 700Credit’s API the same way 700Credit’s many other API partners use it — to view consumer information without storing it locally.

The system relies on consumer reference IDs to retrieve the data. However, 700Credit’s system failed to check whether the specific reference ID belonged to the account requesting it.

“We weren’t validating the consumer reference IDs to the original requestor,” Hill said in an interview with CBT News, a trade publication that covers the auto industry.

Although 700Credit encrypts data on its servers and during transmission, the compromise at the unnamed partner gave hackers access to valid credentials and decryption keys, which they used to make the malicious API calls, Hill said during a December webinar hosted by compliance firm KPA.

“The partner systems have a decryption key … so there is encryption all the way to the delivery to the partner platform,” Hill said during another webinar with compliance firm ComplyAuto.

Once the attackers understood this mechanism, they launched a so-called velocity attack on Oct. 25, bombarding 700Credit’s system with millions of sequential and randomized reference IDs to scrape data from unrelated accounts.

The velocity attack lasted an hour and a half, which was the amount of time it took for security teams to detect the anomaly and disable the compromised API.

In the end, from May to October, the attacker got about 20% of 700Credit’s data.

See also  Huntington eyes Texas growth with $1.9B deal for Dallas bank

Although 700Credit closed the vulnerability quickly, the attackers continued to bombard the company’s infrastructure.

The company received a message from the threat actors on Oct. 31 signaling they had ceased their efforts. 700Credit said in the regulatory filing with the Maine Attorney General that the breach occurred between Oct. 25 and Oct. 27.

Attacker gave assurances to 700Credit

Hill told CBT News that the company seriously weighed paying the attackers to prevent the release of data — a common tactic in data extortion schemes.

“There were several heated conversations about that,” Hill told the news outlet in response to a question about whether 700Credit considered paying the attacker. “I understand both sides of the argument … but you got a business to run, and you have a responsibility to your customers.”

Hill did not explicitly confirm if the company ultimately made a payment, but he noted that he is operating under the assumption that the stolen data has been contained, based on assurances from the attacker.

“We believe we’ve secured the data,” Hill said. However, for the company to believe that the data is secured, “you’re trusting the word of someone that attacked you,” he qualified.

Regulatory relief for dealers

The breach triggered compliance obligations for auto dealers, which are classified as financial institutions under a Federal Trade Commission rule regarding data breach notifications. The rule mandates that institutions report breaches within 30 days.

To mitigate the administrative burden on 700Credit’s 18,000 dealership clients, the National Automobile Dealers Association, or NADA, coordinated with 700Credit to streamline this reporting.

The FTC accepted a proposal allowing 700Credit to file a single, consolidated breach notice on behalf of all affected dealer clients, according to a Dec. 2 notice from NADA.

See also  Market volatility has not cut valuations: Fed report

“Dealers have no obligation to file a breach notice with the FTC related to this matter,” NADA said in the notice.

However, affected dealers must still navigate state-level notification laws. 700Credit is managing these filings and sending notices to consumers on behalf of dealers, but the legal liability generally remains with the dealership as the custodian of the data.

“Generally speaking, the paradigm is that the dealer is the one … they’re generally liable for these notification obligations even if a service provider is the one that had an issue,” said Brad Miller, chief legal officer at ComplyAuto, during the webinar with Hill.

Legal and reputational fallout

Despite the coordinated response, the breach has already sparked litigation.

“People have already filed class action suits before we even released any names,” Hill told CBT News.

State regulators have also urged consumers to take protective action. Michigan Attorney General Dana Nessel advised residents to freeze their credit and monitor for phishing attempts, according to a Dec. 10 press release from her office.

700Credit is providing 12 months of credit monitoring and identity restoration services through TransUnion to affected consumers. The company also advised dealers to review their own vendor management processes, a requirement under FTC rules.

“I would encourage dealers to look at their vendors … understand their security policies, processes in place, and understand their cyber security,” Hill told CBT News.

The company confirmed that the breach did not involve ransomware and that forensics teams found no malware installed on their internal systems.

Source link

Buyers car data hackers million Stole vendor
Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
Previous ArticleMortgage Rates See Little Improvement Despite Highest Unemployment Since 2021
Next Article Nasdaq moves to near 24-hour trading. Some say that’s a bad idea

Related Posts

FDIC approves Erebor Bank’s deposit insurance application

December 17, 2025

GOP senators weigh penalties, fault for debanking

December 17, 2025

FDIC proposes process for banks to issue stablecoins

December 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Manulife’s Natasha Duric: A 30-year mortgage career built on leadership and innovation

October 10, 2024

The top private and public colleges for financial aid

June 25, 2025

Marqeta beats analysts estimates on earnings, revenue | PaymentsSource

August 9, 2025
Ads Banner

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

Stay informed with our finance blog! Get expert insights, money management tips, investment strategies, and the latest financial news to help you make smart financial decisions.

We're social. Connect with us:

Facebook X (Twitter) Instagram YouTube
Top Insights

Robinhood is rolling out NFL parlay and prop bets on prediction markets platform

December 17, 2025

FDIC approves Erebor Bank’s deposit insurance application

December 17, 2025

An Opportunity to Give Back

December 17, 2025
Get Informed

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

© 2025 Smartspending.ai - All rights reserved.
  • Contact
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.