CarGurus Breach: 12.5M Accounts Exposed
In February 2026, the automotive marketplace CarGurus was the target of a data breach attributed to the threat actor ShinyHunters . Following an attempted extortion, the data was published publicly and contained more than 12M email addresses across multiple files including user account ID mappings, ...
Overview
On February 12, 2026, threat actor ShinyHunters publicly released a dataset containing over 12 million CarGurus user records. The breach, which targeted the automotive marketplace, included email addresses, names, phone numbers, and IP addresses across multiple files. After an attempted extortion against CarGurus failed, ShinyHunters published the data on a public forum, where it quickly circulated among credential-stuffing and phishing groups.
The breach was confirmed when the dataset appeared on Have I Been Pwned (HIBP), the independent breach notification service. CarGurus has not yet issued a public statement confirming the full scope, but security researchers have verified the authenticity of the leaked records.
What Was Exposed
The leaked database contained four distinct types of personal data:
- Email Addresses: Over 12 million unique email addresses tied to user accounts.
- Names: Full names of registered users.
- Phone Numbers: Mobile and landline numbers linked to accounts.
- IP Addresses: The IP address from which each user last accessed CarGurus, along with associated timestamps.
Notably, no financial data, social security numbers, or vehicle-specific purchase details were included. However, the combination of email, phone, and IP address is highly valuable for identity theft and account takeover attacks.
How the Breach Happened
ShinyHunters, a known threat actor with a history of targeting e-commerce platforms, claimed responsibility for the intrusion. According to their public statements, the group exploited a misconfigured internal API endpoint that allowed them to scrape user account data without authentication. The attack vector appears to involve compromised credentials or a SQL injection vulnerability found during reconnaissance.
CarGurus is believed to have been notified several weeks before the public release, but ShinyHunters published the data after their extortion demands went unmet. The compromise did not involve customer payment systems or dealer backend databases, but the user-facing platform’s account data was fully exposed.
Who’s Actually Affected
The 12.4 million records affect anyone who created a CarGurus account — not just past or current customers, but also users who registered for saved searches, price alerts, or dealer inquiries. The breach also exposes dormant accounts and old data that may still be linked to recycled passwords.
Users who never received a breach notification from CarGurus should still verify their exposure independently, as the company has not confirmed whether it will notify all affected individuals.
What to Do Right Now
If you have a CarGurus account, take these steps immediately:
- Change Your Password: Update your CarGurus password to a strong, unique one immediately. Do not reuse passwords from other sites.
- Enable Multi-Factor Authentication (MFA): If CarGurus offers MFA, enable it. If not, remain cautious about account activity.
- Beware of Phishing: Expect targeted phishing emails pretending to be from CarGurus, as attackers now have your email, name, and phone number. Never click links in unsolicited messages without verifying the sender.
- Monitor for SIM Swapping: With both your phone number and email exposed, criminals may attempt SIM-swapping. Contact your mobile carrier to add a PIN or extra verification to your account.
How to Check If You’re Affected
You can check if your email address was included in this breach using Have I Been Pwned: https://haveibeenpwned.com/Breach/CarGurus. Enter your email address to see if it appears in the CarGurus dataset.
If your email is listed, assume all associated data (name, phone, IP) was also exposed.
Security Insight
This breach mirrors a pattern seen in other ShinyHunters attacks: the group targets companies with weak API security, scrapes user data, then leaks it when extortion fails. CarGurus, like many automotive platforms, appears to have treated user account data as low-value — not realizing that a name, email, and phone number is a complete identity theft profile. The lesson is clear: any user-facing API that can return account-level data must be secured, rate-limited, and monitored, regardless of whether it touches financial systems. Companies handling consumer PII — even without payment data — should treat every endpoint as a potential target.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach . The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders contai...
In March 2026, the online safety service Aura disclosed a data breach that exposed 900k unique email addresses . The data was primarily associated with a marketing tool from a previously acquired company, with fewer than 20k active Aura customers affected. Exposed data included names, phone numbers,...
In February 2026, a data breach allegedly containing data relating to Canada Goose customers was published publicly . The data contained 920k records with 582k unique email addresses and included names, phone numbers, IP addresses, physical addresses and partial credit card data, specifically card t...
In April 2026, home security firm ADT confirmed a data breach by ShinyHunters , which listed the company on its website as part of a "pay or leak" extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone numbers and physical addresses. ADT also advised that "in a sm...