[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fhRKMqV14C3G0BCYnqo0GViS38cFNfqAW3J0OOuV6rxc":3},{"article":4,"iocs":49},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":28,"category":29,"article_tags":33},"e1caa891-6287-4d05-aadb-0c036ed51c82","Škoda warns of customer data breach after online shop hack","skoda-warns-of-customer-data-breach-after-online-shop-hack-ed36a2","Škoda Auto, a wholly owned subsidiary of the Volkswagen Group, has disclosed a data breach after attackers hacked its online shop and stole the personal information of an undisclosed number of customers. [...]","Škoda Auto, a Volkswagen Group subsidiary, confirmed a data breach affecting its German online shop (shop.skoda-auto.de) after threat actors exploited an unspecified vulnerability in the e-commerce platform's standard software. Stolen data includes customer names, addresses, contact information, phone numbers, order details, and password hashes, though financial information was not compromised. The company fixed the vulnerability, reported the incident to data protection authorities, and noted the breach does not affect its global operations or Škoda Connect Portal.","Škoda Auto discloses data breach after attackers exploited unspecified vulnerability in German online shop.","Škoda warns of customer data breach after online shop hack By Sergiu Gatlan May 12, 2026 01:07 PM 2 Škoda Auto, a wholly owned subsidiary of the Volkswagen Group, has disclosed a data breach after attackers hacked its online shop and stole the personal information of an undisclosed number of customers. The 130-year-old Czech car maker has over 34,000 employees and reported sales of more than €27 billion and a profit of nearly €2 billion in 2025, having delivered over 1 million cars to customers. As Škoda revealed, threat actors gained access by exploiting an unspecified vulnerability in the software of its e-commerce portal. After detecting the breach, the company reported the incident to the relevant authorities and has fixed the security flaw exploited in the attack. \"As part of our technical security monitoring, we discovered that unauthorized individuals had exploited a vulnerability in the standard software used for our online store. This allowed them to temporarily gain unauthorized access to the store system,\" Škoda said. \"The vulnerability has since been resolved, and the incident has been handed over to a specialized IT forensics team for technical analysis. Additionally, the incident was reported to the relevant data protection supervisory authority.\" The customer information accessed by the threat actors includes a combination of names, addresses, contact information (such as email addresses), phone numbers, order information, and login credentials (including the email address and a cryptographic hash of the password). However, according to Škoda, the attackers were unable to access affected customers' financial information because it was not stored on the compromised systems. \"Full credit card details are not stored in the shop system but are processed exclusively by the respective payment service providers. Based on current information, direct access to full credit card details was not possible,\" the company added. Additionally, while it said it has no evidence that the access data has been misused, Škoda warned affected individuals that phishing attacks might target them and that threat actors may try to log in to their other online accounts if they reused the same credentials. Breach only impacts the shop.skoda-auto.de online store A Škoda spokesperson didn't answer BleepingComputer's questions on the breach, including the total number of affected customers and whether the company had been in contact with the attackers about paying a ransom. However, they said the incident only impacted \"the online shop operated by the Škoda Auto importer in Germany and does not concern Škoda Auto globally.\" \"The Škoda Connect Portal and all associated services are not affected by the security incident. The online shop at shop.skoda-auto.de and the Škoda Connect Portal are therefore technically separate systems,\" the spokesperson added. Škoda's announcement comes after carmakers Renault and Dacia also disclosed a data breach affecting UK customers in October, exposing a wide range of personal and vehicle information, including names, addresses, and vehicle identification and registration numbers. One month earlier, Jaguar Land Rover (JLR) was also hit by a cyberattack that led to a 43% decline in third-quarter wholesale volumes and cost the company over $220 million after severely disrupting the automaker's production and retail operations. Update May 13, 09:16 EDT: Added Škoda statement. The Validation Gap: Automated Pentesting Answers One Question. You Need Six. Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.This guide covers the 6 surfaces you actually need to validate. Download Now Related Articles: GitHub links repo breach to TanStack npm supply-chain attack7-Eleven confirms data breach claimed by the ShinyHunters gangInstructure reaches 'agreement' with ShinyHunters to stop data leakHome security giant ADT data breach affects 5.5 million peopleVimeo data breach exposes personal information of 119,000 people","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fskoda-warns-of-customer-data-breach-after-online-shop-hack\u002F","https:\u002F\u002Fwww.bleepstatic.com\u002Fcontent\u002Fhl-images\u002F2026\u002F05\u002F12\u002FSkoda.jpg","2026-05-12T17:07:01+00:00","2026-05-12T18:00:18.045114+00:00",7,[18,21,23,26],{"name":19,"type":20},"Škoda Auto","vendor",{"name":22,"type":20},"Volkswagen Group",{"name":24,"type":25},"shop.skoda-auto.de","product",{"name":27,"type":25},"Škoda Connect Portal","2e06f76c-d5b9-4f54-9eef-4d3447b10730",{"id":28,"icon":30,"name":31,"slug":32},null,"Breaches","breaches",[34,39,44],{"category":35},{"id":36,"icon":30,"name":37,"slug":38},"614132b8-5837-4952-b8b5-c6c9a32a1d85","Privacy","privacy",{"category":40},{"id":41,"icon":30,"name":42,"slug":43},"80544778-fabb-4dcd-aa35-17492e5dcf4f","Vulnerabilities","vulnerabilities",{"category":45},{"id":46,"icon":30,"name":47,"slug":48},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]