Easypark falls victim to a cyber attack and loses data

B2B Cyber ​​Security ShortNews
Advertising

Share post

As the parking service provider Easypark recently announced, the company was the victim of a cyber attack on December 10th. Easypark states that data was lost, but that it was not sensitive. Users must check for themselves whether they are affected by the data loss at Easypark.

The company Easypark informs its customers that the company was hit by a cyber attack on December 10th. Easypark informs on its homepage that only insensitive data was stolen in the attack. The unauthorized access is said to have been noticed immediately and further access is prevented, according to the company. Of course, the authorities would have already been informed.

Advertising

Only a small amount of customer data was leaked

According to Easypark, only a few customers are affected. Regarding the stolen data, the service provider states that contact information (such as name, telephone number, address and/or email address) was stolen. As for the account details, only parts of the numbers were stolen. Easypark states: "When you pay for a parking transaction with a credit card/debit card or IBAN, some digits of the card you have chosen will be displayed. This partial information has been accessed. However, it is not possible to make payments with this incomplete information... No combination of this stolen data can be used to make payments."

By stealing personal data, Easypark explicitly warns against further phishing attacks. The company provides further answers to those affected via a few FAQs. The most important of these is: "How do I know if I am affected?" Customers who want to know the answer to this question should open their app. A banner will then inform them whether they are one of the victims.

Advertising

It is currently not clear who carried out the attack on the service provider Easypark. There is no information to be found on the leak pages of the various attack groups.

More at EasyPark.com

 

Matching articles on the topic

Play ransomware exploits Windows zero-day vulnerability 

According to Symantec, the Play ransomware group and allied groups are using an exploit that targets the zero-day vulnerability CVE-2025-29824. The vulnerability was ➡ Read more

Samsung server software attacked by exploit

A vulnerability was discovered in Samsung MagicINFO 9 in August 2024. After a research report was published in April, ➡ Read more

MITRE CVE program remains in place for the time being

The CVE program, funded by the US government, is considered a crucial component in the global detection of software flaws. Now, funding is to be temporarily suspended. ➡ Read more

LockBit leak site hacked and data stolen

Now LockBit has also become the victim of another hacker: It seems that not only the leak page of the group was hacked, but ➡ Read more

F5 BIG-IP: BSI warns of highly dangerous vulnerabilities

The BSI has issued a warning about F5 products, as they contain several highly dangerous security vulnerabilities that should be closed. The BIG-IP ➡ Read more

Iran, North Korea, Russia: State hackers rely on ClickFix 

State-sponsored hacker groups are increasingly adopting new social engineering techniques originally developed by commercially motivated cybercriminals. ClickFix, for example, is now increasingly ➡ Read more

TA4557: Venom Spider targets HR departments

TA4557, better known as Venom Spider, is increasingly exploiting phishing and trying to deploy its backdoor malware. The focus of the ➡ Read more

Oettinger Brewery attacked by ransomware

The APT group Ransomhouse claims to have successfully attacked the German brewery Oettinger with ransomware. On the APT group's leak page ➡ Read more