# ShinyHunters Leaks CarGurus Data for 12.5 Million Users
The automotive marketplace CarGurus has become the latest victim of ShinyHunters, a notorious hacking collective known for its sophisticated social engineering attacks. In a data breach that began around February 13, 2026, the threat group stole personal information from approximately 12.5 million customer accounts and subsequently published the data publicly after failed extortion negotiations.[4][5] This incident marks another significant security failure for a major online platform and highlights the growing threat of voice phishing attacks targeting enterprise systems.
How ShinyHunters Breached CarGurus
The attack on CarGurus followed a pattern that has become characteristic of ShinyHunters' recent campaign: vishing (voice phishing) combined with single sign-on (SSO) exploitation.[1][2] Rather than relying on traditional hacking methods like brute-force attacks or firewall penetration, the threat group employed a highly effective social engineering strategy.
The attackers impersonated IT support staff and contacted CarGurus employees by phone, convincing them that their multi-factor authentication (MFA) settings required updating.[1] Once employees provided their login credentials and MFA codes, the hackers gained access to the company's SSO dashboard—likely through Okta, Microsoft Entra, or Google SSO.[1] From this privileged position, they could access various cloud-based platforms and data repositories, including Salesforce, Microsoft 365, SharePoint, and Dropbox, allowing them to selectively extract sensitive information.[1]
According to security researchers and reports from The Register, this approach proved devastatingly effective, making CarGurus the 15th organization breached by ShinyHunters using the same vishing methodology.[1]
What Data Was Stolen
The stolen database represents a comprehensive collection of customer and corporate information.[3] The compromised records include:
- Customer Personal Information: Names, phone numbers, physical addresses, and email addresses
- Financial Data: Finance pre-qualification application outcomes and dealership subscription details
- Technical Metadata: Internal account ID mappings and IP addresses
- Corporate Documents: Sensitive internal files and dealer-related information
According to Have I Been Pwned, approximately 12.5 million accounts were affected, though roughly 70% of the leaked data overlapped with previously breached records from other incidents, meaning approximately 3.7 million records represent newly exposed information.[5] The leaked dataset is freely available for download on ShinyHunters' dedicated leak site, creating significant risk for identity theft and fraud.[5]
The Extortion Attempt and Data Publication
ShinyHunters followed its established playbook by issuing an extortion ultimatum with a specific deadline.[1][2] The group demanded ransom payment (the exact amount was not publicly disclosed) and threatened to leak the entire dataset if CarGurus did not reach out by February 20, 2026.[1] The threat included warnings of "several annoying (digital) problems" that would accompany the data release.[1]
When negotiations either failed or were ignored by CarGurus, ShinyHunters made good on its threat and published the stolen data on its leak site, often referred to as part of the "Scattered Lapsus$ Hunters" collective.[2] CarGurus has not publicly commented on the breach or confirmed the authenticity of the stolen data, and its website contains no official disclosure about the incident.[1]
Risks for CarGurus Users
The combination of personal, financial, and technical data exposed in this breach creates multiple attack vectors for cybercriminals.[2] CarGurus users face several specific risks:
- Spear Phishing: Attackers can leverage specific car-buying history and personal details to craft highly convincing fraudulent emails
- Identity Theft: The combination of names, addresses, and finance application outcomes provides sufficient information for fraudulent credit applications
- Credential Stuffing: Users who reuse passwords across multiple platforms risk attackers gaining access to other accounts using credentials obtained from this breach
- Financial Fraud: Finance pre-qualification data and dealership information could be used to open fraudulent accounts or apply for loans
Security experts advise CarGurus users to remain vigilant for potentially malicious communications and scam attempts leveraging the leaked information.[5]
ShinyHunters' Pattern of Attacks
This breach represents part of a broader campaign by ShinyHunters that has targeted numerous major organizations in recent months.[5] The threat group has successfully breached telecommunications providers, fintech companies, retail brands, and technology platforms through similar vishing and SSO exploitation tactics.[5]
Recent victims include Dutch telecommunications provider Odido, ad tech firm Optimizely, fintech firm Figure, outerwear brand Canada Goose, restaurant chain Panera Bread, online dating company Match Group, and music streaming platform SoundCloud.[5] Google and Mandiant security experts have documented how ShinyHunters deploys a highly effective combination of vishing and customized infrastructure to compromise organizations quickly and efficiently.[1]
The threat group typically avoids traditional ransomware approaches, instead focusing on "grab-and-leak" extortion tactics where stolen data is weaponized for ransom demands rather than encrypted systems requiring decryption keys.[6]
Frequently Asked Questions
How did ShinyHunters breach CarGurus?
ShinyHunters used **vishing (voice phishing)** to trick CarGurus employees into providing SSO credentials and multi-factor authentication codes. Attackers impersonated IT support staff and convinced employees that their MFA settings required updating, then used the stolen credentials to access the company's SSO dashboard and extract data from connected platforms like Salesforce and Microsoft 365.[1][2]
How many users were affected by the CarGurus data breach?
Approximately **12.5 million CarGurus customer accounts** were compromised in the breach.[4][5] However, roughly 70% of this data had appeared in previous breaches, meaning approximately **3.7 million records represent newly exposed information**.[5]
What types of personal information were stolen?
The stolen data includes **names, phone numbers, physical addresses, email addresses, user account ID mappings, finance pre-qualification application outcomes, dealership subscription details, and IP addresses**.[2][3][5] Some records also contained sensitive internal corporate documents and dealer-related information.[2]
What should CarGurus users do to protect themselves?
Users should **monitor their accounts for suspicious activity, remain alert for phishing emails and scam attempts, change passwords if they reuse credentials across multiple platforms, and consider placing fraud alerts or credit freezes** with credit bureaus.[5] Users should also be cautious of any unsolicited communications referencing their car-buying history or financial information.
Is this the first major automotive data breach in 2026?
No. CarGurus is the **second major automotive company breached in early 2026**. Last month, data from CarMax was published following a similar failed extortion attempt by threat actors, exposing approximately 431,000 unique email addresses along with names, phone numbers, and physical addresses.[4]
Why is ShinyHunters so effective at breaching organizations?
ShinyHunters combines **sophisticated social engineering with technical exploitation** of SSO systems. Rather than attempting to break through firewalls, the group uses convincing phone calls impersonating IT staff to harvest credentials, then leverages those credentials to access entire ecosystems of cloud-based platforms and data repositories.[1][5] This approach bypasses many traditional security measures and exploits human psychology rather than technical vulnerabilities.
🔄 Updated: 2/24/2026, 9:40:25 PM
**CarGurus ($CARG) stock surged 4.56% amid the ShinyHunters data leak of over 12 million user records, defying typical breach-related selloffs.** Investors appeared unperturbed by the February 13 incident involving PII like names, addresses, and 12.5 million email addresses, as confirmed by Have I Been Pwned, with shares climbing despite the group's February 20 leak ultimatum.[1][4][5] CarGurus stated the breach was "contained and limited in scope," citing no impact on core systems or dealer data, which likely bolstered market confidence.[1]
🔄 Updated: 2/24/2026, 9:50:30 PM
ShinyHunters has published personal data from over 12 million CarGurus accounts after the automotive marketplace failed to meet the hacking group's extortion deadline of February 20, 2026[4][5]. The leaked records include names, email addresses, phone numbers, physical addresses, user account ID mappings, and finance pre-qualification application data, with approximately 3.7 million records being newly exposed beyond data already circulating from previous incidents[5]. The breach originated from a voice phishing attack on February 13, 2026, in which attackers impersonated IT support staff and tricked employees into surrendering Single Sign-On (SSO) codes, bypassing multi-factor authentication
🔄 Updated: 2/24/2026, 10:00:29 PM
**NEWS UPDATE: Consumer Alarm Grows Over ShinyHunters' CarGurus Leak**
Consumers affected by the ShinyHunters breach of 12.5 million CarGurus accounts are flooding Have I Been Pwned with checks, where 70% of the leaked data—roughly 3.7 million fresh records including names, emails, phone numbers, addresses, and finance details—was added on February 22, 2026[2][4]. Security experts urge immediate password changes, warning of phishing and identity theft risks, with one report stating, "CarGurus users are advised to stay alert for potentially malicious communications and scam attempts leveraging the leaked information."[4] No official public backlash quotes fro
🔄 Updated: 2/24/2026, 10:10:35 PM
**BREAKING: ShinyHunters Leak Shakes Up Auto Marketplace Competition.** The ShinyHunters group's leak of **12.5 million CarGurus user accounts**—including names, emails, phone numbers, addresses, finance pre-qual data, and dealer subscriptions—marks the **second major automotive breach this year** after CarMax's 431,000-record exposure last month, potentially eroding trust in CarGurus' platform amid rivals like AutoTrader and Cars.com gaining ground.[3][4][5] With **70% of data previously leaked elsewhere** but **3.7 million fresh records** now public, experts warn of intensified phishing and credential-stuffing risks that could drive users to competitors enforcin
🔄 Updated: 2/24/2026, 10:20:34 PM
**LIVE UPDATE: ShinyHunters CarGurus Breach – Global Ripples Grow.** The CarGurus data leak, exposing **12.5 million user records** including emails, names, phone numbers, addresses, and finance details across its platforms in the **U.S., Canada, and U.K.**, has sparked urgent warnings from Have I Been Pwned, with **70% of data previously leaked but 3.7 million fresh records** now fueling international phishing fears[2][4]. Security outlets like BleepingComputer report no formal statements yet from affected nations' regulators, but experts cite ShinyHunters' recent hits on global firms like Dutch telco Odido, Canada's Canada Goos
🔄 Updated: 2/24/2026, 10:30:33 PM
**NEWS UPDATE: No Regulatory or Government Response to ShinyHunters' CarGurus Data Leak**
As of February 24, 2026, no U.S. regulatory bodies such as the FTC or SEC, nor any government agencies, have issued statements or launched probes into the ShinyHunters breach exposing 12.5 million CarGurus user accounts—including names, emails, phones, addresses, and finance data—despite the leak's publication following a failed extortion deadline on February 20[2][3][4][9]. CarGurus confirmed the incident on February 22, stating: “We secured the affected environment... the activity has been contained and limited in scope,” while hiring a cybersecurity firm but reporting n
🔄 Updated: 2/24/2026, 10:40:34 PM
**BREAKING: Consumer Alarm Mounts Over ShinyHunters' CarGurus Data Leak Affecting 12.5 Million Users**
Users flooded social media with panic after Have I Been Pwned listed the breach on February 22, 2026, revealing 12.5 million compromised accounts—including names, emails, phone numbers, addresses, and finance data—with 70% previously leaked but 3.7 million fresh records now public.[2][4] One affected CarGurus customer tweeted, "Just got HIBP alert—my email, phone, address, and loan pre-qual info stolen. Time to freeze credit!" as experts urged immediate password changes and scam vigilance amid rising phishing fears.[2]
🔄 Updated: 2/24/2026, 10:50:34 PM
**ShinyHunters has published data belonging to approximately 12.5 million CarGurus users after the automotive marketplace failed to meet the group's February 20 ransom deadline.**[4] The leaked dataset includes names, email addresses, phone numbers, physical addresses, user account ID mappings, and finance pre-qualification application data.[4][5] Security researchers warn that CarGurus users face heightened risks of identity theft, spear phishing, and credential stuffing attacks, with roughly 3.7 million records being fresh data not previously exposed in other breaches.[5]
🔄 Updated: 2/24/2026, 11:00:34 PM
**LIVE UPDATE: No Confirmed Regulatory Response to ShinyHunters' CarGurus Data Leak**
As of February 24, 2026, no government agencies or regulators have publicly announced investigations, inquiries, or actions in response to ShinyHunters' leak of 12.5 million CarGurus user accounts—including names, emails, phone numbers, physical addresses, finance pre-qualification data, and dealer subscriptions—following a failed extortion attempt after their February 13 vishing attack.[2][5][7] CarGurus has confirmed securing the environment with a leading cybersecurity firm and stated the incident was "limited in scope" with no compromise to dealer systems, but has not disclosed notifications to authorities like the FTC o
🔄 Updated: 2/24/2026, 11:10:35 PM
**LIVE UPDATE: No Confirmed Regulatory Response to ShinyHunters' CarGurus Breach**
As of February 24, 2026, no U.S. regulatory bodies such as the FTC or SEC have issued statements or launched probes into the ShinyHunters data leak affecting **12.5 million CarGurus accounts**, including names, emails, phone numbers, physical addresses, finance pre-qualification data, and dealer info, per Have I Been Pwned.[4][6] CarGurus confirmed the incident on February 22, stating “the activity has been contained and limited in scope” with an ongoing investigation via a third-party firm, but pledged to notify impacted parties without mentioning government notifications.[2]
🔄 Updated: 2/24/2026, 11:20:37 PM
**ShinyHunters has publicly leaked personal data belonging to 12.5 million CarGurus customers** after the automotive marketplace failed to meet the hacking group's February 20 ransom deadline.[4] The compromised dataset includes names, email addresses, phone numbers, physical addresses, and finance pre-qualification application outcomes, with roughly 3.7 million records being newly exposed data not previously seen in other breaches.[5] CarGurus users are being advised to remain vigilant against phishing attacks and credential stuffing attempts, as cybercriminals can now exploit the leaked information for identity theft and fraudulent credit applications.[2][5]
🔄 Updated: 2/24/2026, 11:30:38 PM
**ShinyHunters has leaked a massive CarGurus dataset exposing PII for 12.5 million user accounts**, including names, phone numbers, physical and IP addresses, user account ID mappings, finance pre-qualification outcomes, and dealer subscription details—70% of which overlaps prior breaches, leaving ~3.7 million fresh records freely downloadable for phishing and credential stuffing[3][4][5]. The attack, starting February 13 via vishing, tricked employees into yielding SSO codes (Okta/Entra/Google) for direct access to Salesforce and other SaaS platforms, bypassing MFA in a tactic now hitting 15+ victims[1][2]. Implications include heightened spear-phishing risks using ca
🔄 Updated: 2/24/2026, 11:40:40 PM
**BREAKING: No official regulatory or government response reported to ShinyHunters' leak of CarGurus data affecting 12.5 million user accounts, including names, emails, phone numbers, physical addresses, and finance pre-qualification details, as confirmed by Have I Been Pwned on February 24, 2026.**[5][6] CarGurus has confirmed an ongoing investigation with a leading cybersecurity firm but has not disclosed notifications to agencies like the FTC or SEC, despite the breach's scale involving roughly 3.7 million fresh records beyond prior leaks.[2][6] Users remain unprotected by any announced federal alerts or enforcement actions as of late February 24.[1][5]