Nissan Japan Data Breach Affects 21,000 Fukuoka Customers
Nissan Motor Co. confirms a data breach affecting 21,000 customers in Japan following a security incident at third-party vendor Red Hat. No financial data was stolen.
Nissan Motor Co. confirms a data breach affecting 21,000 customers in Japan following a security incident at third-party vendor Red Hat. No financial data was stolen.
Nissan Motor Co., Ltd. has officially confirmed a data breach impacting approximately 21,000 customers of Nissan Fukuoka Sales Co., Ltd. in Japan. The incident originated from unauthorized access to a digital environment managed by the software provider Red Hat, which Nissan had commissioned to develop internal customer management systems.
The compromise was first detected by Red Hat on September 26, 2025, and Nissan was formally notified of the exposure on October 3, 2025. Although the breach involves personal details, Nissan has emphasized that no credit card information or financial data was stored in the affected environment or accessed by the unauthorized parties.
This incident highlights the growing risks associated with third-party supply chains, where a security failure at a technical vendor can directly expose the sensitive information of a major corporation’s clientele. For the general public, it serves as a reminder that personal data is often held by a network of interconnected service providers rather than a single entity.
The breach occurred when a threat actor, identified by security researchers as the Crimson Collective, gained access to a self-managed GitLab instance—a platform used by developers to store and manage code—operated by Red Hat Consulting. According to investigative reports, the attackers exfiltrated approximately 570 GB of data from various repositories, including files belonging to Red Hat's clients.
Nissan clarified that the unauthorized party accessed a server specifically dedicated to the customer management system for its Fukuoka-based sales operations. Upon receiving the report from Red Hat, Nissan immediately initiated its incident response protocol, which included notifying the Personal Information Protection Commission (PIPC) in Japan.
The scope of this breach is localized primarily to customers associated with Nissan Fukuoka Sales Co., Ltd. (formerly known as Fukuoka Nissan Motor).
You may be affected if:
Data categories exposed include:
Nissan has faced several challenges regarding digital security over the past five years. In 2021, the company secured a North American Git server that had been left exposed with default "admin" credentials, which led to the leak of 20 GB of proprietary source code.

More recently, in March 2024, the Akira ransomware group targeted Nissan Oceania, compromising government identification documents of customers in Australia and New Zealand. These recurring incidents suggest that while Nissan continues to strengthen its internal defenses, its extensive network of third-party contractors remains a primary point of vulnerability.
Nissan is currently contacting all affected individuals directly via email or physical mail. If you are a customer in the Fukuoka region, please follow these guidelines:
IMMEDIATE ACTION (Today):
SHORT-TERM PROTECTION (This Week):
This breach is a clear example of a "supply chain attack," where hackers target a smaller or more technical company (Red Hat) to reach a larger prize (Nissan). While the number of affected individuals is relatively low compared to global data breaches, the high level of detail in the stolen sales data provides criminals with enough information to conduct highly convincing identity theft or targeted scams.
Furthermore, this event underlines the regulatory pressure on Japanese corporations to maintain strict oversight of their subcontractors. Nissan has stated it will "strengthen its monitoring of its subcontractors" to prevent similar incidents in the future.
Integrating the official perspective provided by the company clarifies the timeline of the response:
"Nissan received a report from RedHat on October 3rd and immediately reported it to the Personal Information Protection Commission. In addition, we contact customers who are believed to have leaked some of their personal information directly," states the official Nissan Corporate Statement.
This direct outreach is standard for organizations complying with Japanese privacy laws, ensuring that the burden of discovery does not rest solely on the customer.
Read Official Nissan Statement (Japanese).