[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f3n0MyjmEr_MUsjl3EEkDd3k74nsSIaO1FICN0Lvjekw":3},{"article":4,"iocs":44},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":23,"category":24,"article_tags":28},"5e87b47d-44ba-48b1-b99f-c9a399572162","Skoda Data Breach Hits Online Shop Customers","skoda-data-breach-hits-online-shop-customers-256de9","Using a vulnerability in the portal, hackers accessed names, addresses, email addresses, and phone numbers. The post Skoda Data Breach Hits Online Shop Customers appeared first on SecurityWeek.","Skoda disclosed a data breach affecting its online shop after discovering a software vulnerability in the portal. Attackers exploited the bug to access customer personal information including names, addresses, email addresses, phone numbers, order details, and password hashes, though no credit card data was compromised. The company took the shop offline, patched the vulnerability, and engaged external forensics experts while notifying authorities.","Skoda data breach exposes customer names, addresses, emails, and phone numbers via portal vulnerability.","Automobile manufacturer Skoda has disclosed a data breach impacting the personal information of its online shop’s users. The incident, the company says, was discovered as part of its technical security monitoring and was the result of a vulnerability in the portal’s software. Immediately after learning of the cyberattack, the car maker took the shop offline, patched the exploited vulnerability, reviewed existing security mechanisms, and retained external forensics experts to help with the investigation. It also notified the relevant authorities. The hackers, it explains, exploited the bug to access the shop system and accessed data processed through it, including customer names, addresses, email addresses, phone numbers, order details, and information on user accounts. According to Skoda, password hashes were also accessed as part of the breach, but no credit card data was compromised, as these details are processed exclusively through payment service providers and not stored on its systems. The car maker says that the protocols it has in place make it impossible to determine if and to what extent data was exfiltrated from its servers. The company has yet to disclose how many individuals were potentially affected. Advertisement. Scroll to continue reading. Skoda says it has no evidence that the potentially compromised data might have been misused, but tells users to remain vigilant for phishing messages and unauthorized account logins. The company also recommends that users change their passwords, especially if used with multiple accounts across different services, and refrain from disclosing personal information or clicking on links in communication that refers to their relationship with Skoda. Established in 1896 in the Czech Republic, Skoda has been a wholly owned subsidiary of Volkswagen Group since 2000. Skoda cars are sold in over 100 countries. Related: AI Firm Braintrust Prompts API Key Rotation After Data Breach Related: Edtech Firm Instructure Discloses Data Breach Amid Hacker Leak Threats Related: Vimeo Confirms User and Customer Data Breach Related: Luxury Cosmetics Giant Rituals Discloses Data Breach Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire GitHub Confirms Hack Impacting 3,800 Internal RepositoriesVerizon DBIR 2026: Vulnerability Exploitation Overtakes Credential Theft as Top Breach VectorUnpatched ChromaDB Vulnerability Can Lead to Server TakeoverB1ack’s Stash Marketplace Gives Away 4.6 Million Stolen Credit Cards201 Arrested in Crackdown on Cybercrime in Middle East, North AfricaPoC Released for DirtyDecrypt Linux Kernel Vulnerability‘Claw Chain’ OpenClaw Flaws Allow Sandbox Escape, Backdoor DeliveryResearcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE Latest News Quantum Bridge Raises $8 Million for Quantum-Safe Key Distribution SolutionMicrosoft Rolls Out Mitigations for ‘YellowKey’ BitLocker BypassAI-Powered App Attacks Are Faster, More Frequent and Harder to Stop1Password Teams With OpenAI to Stop AI Coding Agents From Leaking CredentialsAnthropic Silently Patches Claude Code Sandbox BypassOver 320 NPM Packages Hit by Fresh Mini Shai-Hulud Supply Chain AttackCaught Off Guard: Securing AI After It Hits ProductionReal-World ICS Security Tales From the Trenches Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register Webinar: Third-Party Risk in Practice June 4, 2026 Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice. Register People on the MoveTim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.IRONSCALES has named Steve McKenzie as Chief Operating Officer.Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.More People On The MoveExpert Insights Caught Off Guard: Securing AI After It Hits Production As enterprises rush AI projects into production, security teams are increasingly being forced into reactive mode. (Joshua Goldfarb) Cyber Resilience is the New Business Continuity Plan The organizations best prepared to face disruption are those that align security, continuity and risk management around what the business cannot afford to lose. (Steve Durbin) Enhancing Data Center Security Without Sacrificing Performance For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael) Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Flipboard Reddit Whatsapp Whatsapp Email","https:\u002F\u002Fwww.securityweek.com\u002Fskoda-data-breach-hits-online-shop-customers\u002F","https:\u002F\u002Fwww.securityweek.com\u002Fwp-content\u002Fuploads\u002F2024\u002F06\u002Fcars.jpeg","2026-05-11T11:54:27+00:00","2026-05-11T12:00:17.441326+00:00",7,[18,21],{"name":19,"type":20},"Skoda","vendor",{"name":22,"type":20},"Volkswagen Group","2e06f76c-d5b9-4f54-9eef-4d3447b10730",{"id":23,"icon":25,"name":26,"slug":27},null,"Breaches","breaches",[29,34,39],{"category":30},{"id":31,"icon":25,"name":32,"slug":33},"614132b8-5837-4952-b8b5-c6c9a32a1d85","Privacy","privacy",{"category":35},{"id":36,"icon":25,"name":37,"slug":38},"80544778-fabb-4dcd-aa35-17492e5dcf4f","Vulnerabilities","vulnerabilities",{"category":40},{"id":41,"icon":25,"name":42,"slug":43},"c5eccf7c-abbc-4bd3-bbed-e6da5cba8e73","Incident Response","incident-response",[]]