AUTOSUR Breach: 487K Accounts Exposed
In March 2025, the French vehicle inspection company AUTOSUR suffered a data breach exposing over 10M customer records, though only 487k unique email addresses were present. The compromised data included names, phone numbers, physical addresses, and vehicle details such as make and model, VIN, and r...
Overview
In March 2025, AUTOSUR, a French vehicle inspection company, suffered a data breach that exposed over 10 million customer records, though only 487,226 unique email addresses were present. The compromised data included names, phone numbers, physical addresses, and detailed vehicle information such as make, model, and Vehicle Identification Numbers (VINs). This breach was reported to Have I Been Pwned, allowing affected individuals to verify if their data was included.
What Was Exposed
The breach exposed a combination of personal and vehicle-specific data, creating unique risks for both identity theft and targeted fraud:
- Email Addresses – Primary account identifier, enabling phishing and credential reuse attacks.
- Names and Phone Numbers – Allows scammers to craft convincing social engineering attempts by referencing real AUTOSUR appointments or services.
- Physical Addresses – Combined with vehicle details, this can be used for identity theft, fraudulent registration, or physical theft attempts.
- Vehicle Details – Make, model, and particularly the VIN (Vehicle Identification Number), which is the unique fingerprint of a vehicle. VINs are often used to obtain replacement license plates, clone vehicles, or commit title washing fraud.
While no financial data or passwords were reported, the bundle of personal and vehicle identifiers is highly valuable on dark web markets.
Account Takeover Risks
The primary immediate risk is account takeover through credential reuse. With email addresses exposed, attackers will attempt to use the same login credentials that customers may have used on AUTOSUR across other services like banks, email providers, or social media.
Additionally, the vehicle details provide a powerful phishing vector. Attackers can craft highly convincing emails or text messages referencing the customer’s specific car, inspection date, or location - making fraudulent messages nearly indistinguishable from legitimate AUTOSUR communications.
Identity Theft Risks
The combination of a full name, address, phone number, and VIN is a complete identity fraud starter kit. Common fraud scenarios include:
- Vehicle title fraud – Criminals can use VINs to create fake title documents and sell stolen or nonexistent vehicles.
- Insurance fraud – Stolen VINs can be used to file false insurance claims or obtain fraudulent policies.
- Loan application fraud – Combining VIN and personal data makes it easier to apply for auto loans in someone’s name.
How to Check If You’re Affected
If you have an AUTOSUR account or suspect your vehicle data may have been involved, you can check directly:
- Visit Have I Been Pwned – Go to haveibeenpwned.com and enter your email address. The site will confirm if your data is in this specific breach.
- Check for AUTOSUR notification emails – The company may have sent breach notifications directly to affected email addresses.
- Review vehicle registration records – If you suspect misuse, check your national vehicle registration database for unauthorized changes to your VIN or registration details.
What to Do Right Now
Based on the exposed data types, here are immediate steps to protect yourself:
- Enable two-factor authentication (2FA) on any accounts that share your breached email address. Even though passwords weren’t exposed, email addresses are the key to account takeover.
- Be wary of vehicle-themed phishing – Any unsolicited message referring to your AUTOSUR inspection, VIN, or vehicle details should be treated as suspicious. Do not click links or download attachments.
- Place a fraud alert on your credit file – If you have a credit file in your country, a fraud alert makes it harder for criminals to open accounts in your name.
- Monitor vehicle registration records – In the UK, check the DVLA; in the US, check your state’s DMV. Look for any unauthorized changes to your vehicle’s ownership or title status.
Security Insight
This breach illustrates that organizations storing vehicle data should treat it with the same sensitivity as any PII. Unlike email addresses, which can be changed, a VIN is permanent and cannot be rotated. AUTOSUR’s failure to secure this non-changeable identifier against a breach of this scale represents a serious lapse in data governance. Companies handling vehicle inspection records should adopt encryption at rest and apply advanced access controls, especially for VINs, to prevent similar exposures in the future. For broader context on how vehicle data breaches are being addressed, see our recent cybersecurity news coverage.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, Canada Life was the victim of a "pay or leak" extortion campaign by the ShinyHunters group . The group subsequently published the data which contained over 200k unique email addresses along with names, phone numbers, physical addresses and, in some cases, customer support tickets. In ...
In March 2026, the AI-driven merchant data platform Woflow was named as a victim by the ShinyHunters data extortion group . The group subsequently published tens of thousands of files allegedly obtained from the company, comprising more than 2TB of data. The trove included hundreds of thousands of e...
In April 2026, the ultra-luxury hotel brand Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign , with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on...
In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses...