2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
The Everest ransomware group claims to have hacked Nissan, releasing screenshots of internal files and directory structures. They are demanding a response within five days or they will leak the data online. This incident adds to Nissan's history of cybersecurity breaches.
If you do, here's more
The Everest ransomware group has claimed responsibility for breaching Nissan Motor Corporation, posting their assertions on a dark web leak site on January 10, 2026. They shared six screenshots that allegedly display data taken from Nissan, including a directory structure with various file types like ZIP archives, text documents, Excel sheets, and CSV files. The leaked content appears to consist of organized internal documents related to dealership operations, financial records, and possibly certification reports. While the screenshots do not show sensitive personal data, the file names suggest access to critical internal systems.
This isn't Nissan's first encounter with cyber threats. In August 2025, the Qilin ransomware group claimed to have stolen 4TB of data from Nissan's design subsidiary, Creative Box Inc. Earlier, in March 2024, Nissan reported a breach that compromised the personal details of over 100,000 employees and customers. A misconfigured Git server led to the leak of Nissan’s source code in January 2021, exposing the company to further vulnerabilities.
Everest is one of the more aggressive ransomware groups, having targeted numerous significant organizations in 2025 and continuing its activities into 2026. They’ve publicly threatened to release the allegedly stolen Nissan data if the company does not respond within five days. As of now, Nissan has not made any public statements about the claims, leaving uncertainty about how they will handle the situation.
Questions about this article
No questions yet.