HERTZ data violation exposes customer information

HERTZ data violation exposes customer information

Most companies use different suppliers to administer different parts of their business, such as customer management, finance, payroll and social networks. To do this, they share access to customer data with these platforms. The problem is that not all suppliers take cyber security, and computer pirates are aware of that.

More and more, the attackers pursue these weakest links in the digital supply chain. These types of infractions often occur in silence, exposing large amounts of customer information without touching the main systems of a company. It is becoming a serious concern for companies and their customers.

One of the last cases involves Hertz, the car rental giant, who recently confirmed that customer data were exposed due to a cyber attack in one of its software suppliers.

Usa to the “Cyberguy Free Report: Obtain my expert technical advice, critical security alerts and exclusive offers, in addition to instant access to my free “Survival guide for definitive scam “ When you register!

Hertz 1

HERTZ rental location (Hertz)

What happened in Hertz?

Hertz, the global car rental company that also operates dollar and saving, has revealed a data violation affecting thousands of its customers. The incident comes from a cyber attack in one of its third -party suppliers, the Cleo software provider, between October and December 2024. The violation did not compromise the internal Systems of Hertz directly but involved data that had been shared with the supplier as part of its operational workflow.

Committed data vary according to the region, but include confidential personal information, such as names, birth dates, contact data, driver’s license numbers and, in some cases, social security numbers and other identifications issued by the Government. Certain financial information, including the details of the payment card and the workers compensation claims, was also among the stolen records.

In the US, the disseminations were presented with regulatory bodies in California, Texas and Maine. Specifically, 3,457 individuals were affected in Maine and 96,665 in Texas. However, it is believed that the total global impact is much greater. Customers in Australia, Canada, the EU, New Zealand and the United Kingdom were also notified by non -compliance notices on Hertz regional websites.

What is artificial intelligence (AI)?

It is believed that rape is the work of the Ransomware Clop gang, a well -known piracy group linked to Russia. Clop exploded zero day vulnerability in Cleo Business Archives Transfer software, technology used by many large organizations to safely transmit confidential commercial data. In 2024, the gang launched a mass overcrowding campaign aimed at Cleo users, stealing data from more than 60 companies, including Hertz.

Interestingly, although Hertz was appointed on the Dark Web Fuga site of Clop in 2024, the company initially declared that “had no evidence” that its systems or data had compromised.

When Cyberguy contacted him, a HERTZ spokesman said: “In Hertz, we take the privacy and security of personal information seriously. This supplier event involves Cleo, a file transfer platform used by Hertz for limited purposes. However, to date, our forensic research has not found evidence that Hertz has been affected by this event. zero day vulnerabilities within the Cleo platform in October 2024 and December 2024 “.

Hertz 2

HERTZ rental location (Hertz)

200 million social media records filtered in data violation x Major X

What does this mean for customers?

Although Hertz’s internal systems were not violated, the exhibition of personal data, including driver’s license numbers, contact data and IDs issued by the Government, raises serious risks. Affected people can be vulnerable to Identity theftfraudulent and objective accounts openings Phishing attempts. If social security numbers were involved, the damage potential increases significantly. Anyone who rented Hertz, dollar or saving between October and December 2024 must be on a maximum alert.

laptop

A hacker at work (Kurt “Cyberguy” Knutsson)

Malware exposes 3.9 billion passwords in a great threat of cybersecurity

7 ways to protect yourself after HERTZ data violation

If you think it was affected or simply wants to be cautious, here there are some steps that you can take right now to stay safe from the violation of Hertz data.

1. Be careful with phishing scams and use strong antivirus software: With access to your email, telephone number or identification documents, attackers can create convincing phishing emails that seek to be medical care providers or banks. These emails can include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my elections from the best antivirus protection winners 2025 for your Windows, Mac, Android and iOS devices.

2. Rub your Internet data using a personal data disposal service: The more exposed your personal information is, the easier, the scammers use it against you. After the violation of Hertz, consider eliminating your public database information and people search sites. See my best selections to obtain data removal services here.

3. Safeguard against identity theft and use identity theft protection: Computer pirates now have access to high value of HERTZ’s rape, including social security numbers, driver’s license and bank information. This makes you a main objective for identity theft. They can also help you freeze your bank and credit card accounts to avoid greater unauthorized use by criminals. Registering in the protection of identity theft gives you monitoring 24 hours a day, 7 days a week, unusual activity alerts and support if your identity is stolen. See my advice and the best selections on how to protect yourself from identity theft.

Get the News business on the fly by clicking here

4. Configure fraud alerts: Request fraud alerts notifies creditors who need an additional verification before issuing credit to your name. You can request fraud alerts through any of the three main credit offices; They will notify others. This adds another protection layer without completely freezing access to credit.

5. Monitor your credit reports: Verify your regular credit reports Annual Creditreport.comwhere you can access free reports from each office once a year or more frequently if you are worried about fraud. Occupy unauthorized accounts can avoid major financial damage.

6. Change passwords and use a password administrator: Update passwords in any account linked to compromised data. Use unique passwords that are difficult to guess and allow a password administrator to do heavy job generating safe for you. Reuse passwords are an easy objective after violations. Consider password administrators for comfort and security. Get more details about me The best password administrators reviewed by experts of 2025 here.

7. Be careful with social engineering attacks: Computer pirates can use stolen details, such as names or birth dates of violations in telephone scams or false customer service calls designed to deceive it to reveal more sensitive information. Never share personal data on calls or emails not requested. Social engineering attacks depend on trust, and surveillance is key.

Hackers who use malware to steal data from Flash USB units

Kurt key takeway

The cyber risk does not always come from a company’s own network. It often originates in the invisible corners of the digital supply chain. Even when companies doubled in internal cybersecurity, they must be equally rigorous in the way they examine and monitor third party suppliers. For consumers, it is not enough to trust the great brand of the label. The data path is broader, the largest attack surface and the much more opaque consequences.

Click here to get the News application

If companies cannot protect our data, should they be to collect so much? Get us knowing in Cyberguy.com/contact.

To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter.

Ask Kurt or tell us what stories you would like us to cover.

Follow Kurt in his social channels:

  • Facebook
  • YouTube
  • Instagram

Answers to the most informed Cyberguys questions:

  • What is the best way to protect your MAC devices, Windows, iPhone and Android to be pirate?
  • What is the best way to stay private, safe and anonymous while navigating the web?
  • How can I get rid of robocalls with data elimination applications and services?
  • How do I eliminate my private internet data?

New Kurt:

  • Try the new Cyberguy games (crosswords, words searches, trivia and more!)
  • Cyberguy exclusive coupons and offers
  • The best gifts for mom 2025

Copyright 2025 Cyberguy.com. All rights reserved.

Kurt “Cyberguy” Knutsson is a award -winning technological journalist who has a deep love for technology, equipment and devices that improve life with their contributions for News & News Business Startzing Mornings in “News & Friends”. Do you have a technological question? Get the free Kurt’s free newsletter, share your voice, an idea of ​​the story or comment on Cyberguy.com.

Leave a Reply

Your email address will not be published. Required fields are marked *