Everest Ransomware Alleges Data Breach at Nissan, Reporting 900GB of Stolen Information

The Everest ransomware group has reportedly breached Nissan Motor Corporation, a prominent Japanese automaker based in Yokohama. The group’s announcement surfaced on its dark web leak site on January 10, 2026, where they released six screenshots purportedly showcasing data obtained from the compromise.

In the leaked images, the Everest group provided a glimpse into directory structures that indicate a wide array of data types, including ZIP archives, text documents, Excel spreadsheets, and CSV files. These materials appear to contain organized internal records aligned with Nissan’s operational framework, encompassing reports, data extracts, and documentation pertinent to dealership activities.

Among the file formats displayed are .csv, .txt, .pgp, and .xls, suggesting a spectrum of structured data aimed at reporting and analytical purposes. Some files are explicitly marked with references to dealership information, certification reports, and claims processing records. Notably, one screenshot reveals a spreadsheet listing dealership names alongside addresses, cities, and states, hinting at its potential ties to regional operations or incentive strategies.

While the screenshots do not explicitly show sensitive personal data, the folder names and file types imply that the accessed operational documents might expose internal processes or enable further extraction of sensitive information. The Everest group’s ultimatum to Nissan is clear: the company has five days to respond before the compromised data is disclosed publicly.

Screenshot from the dark web leak site of the Everest Ransomware group.

Nissan and Cybersecurity

Nissan’s history with cybersecurity breaches is notable. In August 2025, the Qilin ransomware group claimed to have exfiltrated 4TB of data from Nissan CBI, a design subsidiary located in Tokyo. Earlier, in March 2024, Nissan acknowledged a data breach from December 2023, which compromised personal information of over 100,000 employees and customers across both Nissan Motor Corporation and Nissan Financial Services in Australia and New Zealand.

The security challenges continued into January 2021, when Nissan’s source code was exposed due to a misconfigured Git server, which had default login credentials that comprised “admin” for both username and password. Such instances underline the persistent vulnerabilities that large organizations must address.

Everest and High-Profile Data Breaches

The Everest ransomware group has rapidly established itself as a significant player in the cybercriminal landscape, with its activities persisting into 2026 following a busy year in 2025. Their prior targets include high-profile entities such as ASUS, Chrysler, Iberia Airlines, Under Armour, and Petrobras, among others. This ongoing trend raises concerns about security fortifications across industries heavily reliant on digital infrastructures.

Missed opportunities for preventive measures could have far-reaching consequences for businesses like Nissan, especially given the growing sophistication of ransomware tactics. While no public response from Nissan has emerged following Everest’s claims, the scenario underscores the ceaseless pressure imposed by adversarial groups on large corporations, continuously testing their cybersecurity postures.

As industry stakeholders anticipate Nissan’s next move, the potential implications of data release could reverberate throughout the automotive sector and beyond, highlighting the critical importance of robust cybersecurity protocols in safeguarding against such threats. The landscape of cyber warfare continues to evolve, necessitating heightened vigilance among organizations to mitigate the risks posed by ransomware and other malicious activities.

Source