Europcar data breach could affect up to 200,000 customers
Hackers say they've accessed all the firm's GitLab repositories - Europcar denies the claims


Europcar has reportedly suffered a massive data breach affecting as many as 200,000 customers.
The car rental firm has confirmed the hack to BleepingComputer, adding that it's assessing the damage and notifying affected individuals.
The statement follows a post in an underground forum from a hacker claiming to have obtained all the firm's GitLab repositories, accessing more than 9,000 SQL files with backups that contain personal data.
Similarly, the threat actor claimed to have gained access to at least 269 .ENV files used to store configuration settings for applications, environment variables, and sensitive information.
The hackers in question have threatened to publish 37GB of data, including backups and details about the company’s cloud infrastructure and internal applications.
Europcar has denied that the full repositories were stolen, however. Exposed data included only the names and email addresses of Goldcar and Ubeeqo users, with bank and card details and passwords not exposed.
Source of Europcar data breach still unknown
It's not known how the hackers were able to compromise Europcar’s GitLab account.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
However, Martin Reynolds, field CTO at security firm Harness, said one of the most common ways cybercriminals compromise systems such as these is to spoof a popular code repository infected with an infostealer malware, then trick developers into downloading it.
To protect themselves from these threats, Reynolds advised organizations to make sure their repositories are protected by minimal token permissions, so only users who should have access can perform actions such as editing or downloading new code.
They should also automate scans at the moment developers add to source code repositories, so that company data won't be exposed in the event of a breach.
"This should be combined with DevSecOps best practices such as automated governance and security checks to scan new code for malicious code – like infostealer malware – before it is introduced," he said.
"These approaches make it more difficult for spoofed code repositories to make it through to live environments where they can be used to gain access to other systems.
"By embedding these types of controls early in the software lifecycle, security stays a priority, not an afterthought, and ensures that company secrets are kept under lock and key."
This attack has been confirmed - unlike an alleged intrusion last year, in which a hacker forum member claimed to have accessed the personal information of nearly 50 million customers. Europcar denied the claims.
MORE FROM ITPRO
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published