Where it Hertz: Customer data driven off in Cleo attacks
(2025/04/15)
- Reference: 1744716671
- News link: https://www.theregister.co.uk/2025/04/15/hertz_cleo_customer_data/
- Source link:
Car hire giant Hertz has confirmed that customer information was stolen during the zero-day data raids on Cleo file transfer products last year.
A breach notification was issued on Monday on behalf of Hertz, Dollar, and Thrifty brands, suggesting customers of all three Hertz Corporation-owned car hire businesses were affected.
Hertz didn't detail the number of customers exposed but said names, contact information, dates of birth, credit cards, driver's license information, and details related to workers' compensation claims were involved.
[1]
A smaller subset of customers may also have had more sensitive data stolen, including Social Security or other government identification numbers, passport information, Medicare or Medicaid ID, or injury-related information associated with vehicle accident claims.
[2]
[3]
For those wondering why a car hire company would have Medicare data, it's for cases involving workers' compensation claims.
The files were stolen from a Cleo file transfer product Hertz uses "for limited purposes," though it didn't specify which.
[4]
At the time of the [5]mass-exploitation event last year, Cleo patched its Harmony, VLTrader, and LexiCom products against CVE-2024-50623, and then CVE-2024-55956, which bypassed the initial patch.
Cybercrime crew [6]Cl0p claimed responsibility for the Cleo attacks, which according to its leak site at various stages affected around 70 organizations.
[7]Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility
[8]Fully patched Cleo products under renewed 'zero-day-ish' mass attack
[9]Akira ransomware is encrypting victims again following pure extortion fling
[10]Batten down the hatches, it's time to patch some more MOVEit bugs
The remainder of Hertz's [11]notification letter [PDF] reads like countless others.
It says: "Hertz takes the privacy and security of personal information seriously. To that end, Hertz has confirmed that Cleo took steps to investigate the event and address the identified vulnerabilities. Hertz also reported this event to law enforcement and is in the process of reporting the event to relevant regulators."
It also said it has so far found no evidence that any of the stolen data had been misused but urged customers to be vigilant for any fraudulent activity on their accounts. The usual stuff.
[12]
To help with that, Hertz also said it paid Kroll to offer affected individuals two years of identity monitoring or dark web monitoring services "out of an abundance of caution."
Of the approximately 70 organizations hit by the Cleo attacks, according to Cl0p's disclosures, relatively few have publicly acknowledged the matter. Some said they were investigating Cl0p-related breaches, while German manufacturer Covestro is the only other to [13]confirm a successful attack. ®
Get our [14]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[5] https://www.theregister.com/2024/12/10/cleo_vulnerability/
[6] https://www.theregister.com/2024/12/16/ransomware_attacks_exploit_cleo_bug/
[7] https://www.theregister.com/2024/12/16/ransomware_attacks_exploit_cleo_bug/
[8] https://www.theregister.com/2024/12/10/cleo_vulnerability/
[9] https://www.theregister.com/2024/10/22/akira_encrypting_again/
[10] https://www.theregister.com/2024/06/26/batten_down_the_hatches_its/
[11] https://www.hertz.com/content/dam/hertz/global/resources/Notice_of_Data_Incident-United_States.pdf
[12] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[13] https://techcrunch.com/2025/01/16/clop-ransomware-gang-names-dozens-of-victims-hit-by-cleo-mass-hack-but-several-firms-dispute-breaches/
[14] https://whitepapers.theregister.com/
A breach notification was issued on Monday on behalf of Hertz, Dollar, and Thrifty brands, suggesting customers of all three Hertz Corporation-owned car hire businesses were affected.
Hertz didn't detail the number of customers exposed but said names, contact information, dates of birth, credit cards, driver's license information, and details related to workers' compensation claims were involved.
[1]
A smaller subset of customers may also have had more sensitive data stolen, including Social Security or other government identification numbers, passport information, Medicare or Medicaid ID, or injury-related information associated with vehicle accident claims.
[2]
[3]
For those wondering why a car hire company would have Medicare data, it's for cases involving workers' compensation claims.
The files were stolen from a Cleo file transfer product Hertz uses "for limited purposes," though it didn't specify which.
[4]
At the time of the [5]mass-exploitation event last year, Cleo patched its Harmony, VLTrader, and LexiCom products against CVE-2024-50623, and then CVE-2024-55956, which bypassed the initial patch.
Cybercrime crew [6]Cl0p claimed responsibility for the Cleo attacks, which according to its leak site at various stages affected around 70 organizations.
[7]Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility
[8]Fully patched Cleo products under renewed 'zero-day-ish' mass attack
[9]Akira ransomware is encrypting victims again following pure extortion fling
[10]Batten down the hatches, it's time to patch some more MOVEit bugs
The remainder of Hertz's [11]notification letter [PDF] reads like countless others.
It says: "Hertz takes the privacy and security of personal information seriously. To that end, Hertz has confirmed that Cleo took steps to investigate the event and address the identified vulnerabilities. Hertz also reported this event to law enforcement and is in the process of reporting the event to relevant regulators."
It also said it has so far found no evidence that any of the stolen data had been misused but urged customers to be vigilant for any fraudulent activity on their accounts. The usual stuff.
[12]
To help with that, Hertz also said it paid Kroll to offer affected individuals two years of identity monitoring or dark web monitoring services "out of an abundance of caution."
Of the approximately 70 organizations hit by the Cleo attacks, according to Cl0p's disclosures, relatively few have publicly acknowledged the matter. Some said they were investigating Cl0p-related breaches, while German manufacturer Covestro is the only other to [13]confirm a successful attack. ®
Get our [14]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[5] https://www.theregister.com/2024/12/10/cleo_vulnerability/
[6] https://www.theregister.com/2024/12/16/ransomware_attacks_exploit_cleo_bug/
[7] https://www.theregister.com/2024/12/16/ransomware_attacks_exploit_cleo_bug/
[8] https://www.theregister.com/2024/12/10/cleo_vulnerability/
[9] https://www.theregister.com/2024/10/22/akira_encrypting_again/
[10] https://www.theregister.com/2024/06/26/batten_down_the_hatches_its/
[11] https://www.hertz.com/content/dam/hertz/global/resources/Notice_of_Data_Incident-United_States.pdf
[12] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z_6CrDQbt4g4drLco6_wKwAAAQY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[13] https://techcrunch.com/2025/01/16/clop-ransomware-gang-names-dozens-of-victims-hit-by-cleo-mass-hack-but-several-firms-dispute-breaches/
[14] https://whitepapers.theregister.com/
Untrustworthy Kroll
An_Old_Dog
Sure -- give your personal financial data to Kroll so they can monitor your accounts for potential fraud. This is the same Kroll which was phished and had peoples' financial data stored on their systems raided.
(One paragraph, then paywall)
https://www.theinsurer.com/cyber-risk/news/exclusive-kroll-breached-via-phishing-attack-that-disclosed-clients-account-2025-03-03/
Yo dawg, etc.
Michael Strorm
Looks like an opportunity for Xzibit to launch a fraud-checking service for fraud-checking services, so you can fraud check while you fraud check.
Timely warning
Thank you soooo much Hertz for a timely warning just 4 months after hackers got a copy of that data.