Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Nissan says hackers stole user IDs, hashed passwords

The company said that personal information and e-mail was not compromised

Nissan said it found malicious software on its network that stole employee user IDs and hashed passwords, but said no personal information or e-mails appeared to have been compromised.

The car company released a statement on April 20, one week after the intrusion was detected. Jeff Kuhlman, Nissan's head of global communications, said on Thursday that Nissan delayed disclosing the breach sooner in order to cleanse its network of the malicious software and prevent tipping off the hackers.

"We are working with security software specialists and making sure that all the doors are closed and that going forward we have the most secure system we can have," Kuhlman said.

Nissan said in a statement that the malware accessed a data store that held employee user account credentials. Kuhlman said the company is not sure what information the hackers were after.

"As a result of our swift and deliberate actions we believe that our systems are secure and that no customer, employee or program data has been compromised," according to the statement.

Nissan said it would "continue to vigilantly maintain our protection and detection systems and related countermeasures to keep ahead of emerging threats."

Storing hashed passwords rather than passwords in clear text is considered a good security practice. A hash is a cryptographic representation of a password, but the hash can be converted back to the original password using modest computing power and password cracking programs.

The shorter and less complicated the password, such as those without capital letters and numbers, the faster it can be decoded.

Send news tips and comments to jeremy_kirk@idg.com

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: etwork, Intrusion, Nissan
References show all
Comments are now closed.
Related Whitepapers
Latest Stories
Community Comments
Latest Blog Posts
Whitepapers
  • PCI DSS v3.0 - Compliance Guide
    Due to a lack of consumer confidence and a subsequent drop in sales, all entities that handle credit cardholder information are being challenged to adopt more effective data protection measures. This paper provides information on available tools to help validate compliance with the latest version of the Payment Card Industry Data Security Standard (PCI DSS).
    Learn more »
  • Guide: 10 Essential Questions about Mobile App Containers
    Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring significant security risks. How do you navigate the challenge and emerge with both? With a comprehensive approach to security.Learn the key areas to focus on as you build a mobile app security strategy.
    Learn more »
  • Research firm Radicati names Google Apps for Business the leader in cloud business email
    Radicati Market Quadrants illustrate how individual vendors fit within a specific technology market, classifying them as niche specialists, up-and-coming pioneers, today’s top players or yesterday’s leaders. In August 2013, Radicati used this model t o assess and compare 14 cloud business email providers, including Google.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments