Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Europecar Gitlab Breach

Type
Incident
Actors
❓Unknown
Pub. date
April 4, 2025
Initial access
Unknown
Impact
Data exfiltration
Targeted technologies
GitLab
References
https://www.bleepingcomputer.com/news/security/europcar-gitlab-breach-exposes-data-of-up-to-200-000-customers/
Status
Finalized
Last edited
Apr 6, 2025 1:34 PM

A hacker breached the GitLab repositories of Europcar Mobility Group and stole source code for Android and iOS apps, along with SQL backups and configuration files that included personal data. The attacker, using Europcar’s name as an alias, claimed to have extracted over 9,000 SQL files and 269 .env files containing credentials and environment variables. They attempted to extort the company by threatening to publish 37GB of data, including internal application details and cloud infrastructure information. While the attacker claimed to have exfiltrated all GitLab repositories, Europcar confirmed that some of their source code remained untouched. Screenshots shared by the attacker showed employee credentials embedded in the stolen code, validating the breach.

The stolen data reportedly includes only names and email addresses of up to 200,000 customers from the Goldcar and Ubeeqo brands, with no evidence of financial or password-related exposure. Europcar is currently assessing the full scope of the damage, notifying affected individuals, and has informed the data protection authority. Although the exact intrusion vector is unknown, the incident may be linked to compromised credentials from infostealer malware—an increasingly common breach method.

Made with 💙 by Wiz

Last Updated: April 3, 2025