Massive 70TB Data Leak at Tata Motors from Exposed AWS Keys

Tata Motors Data Leak Exposes 70TB of Sensitive Data Due to Misconfigured AWS Credentials

HIGH
October 29, 2025
5m read
Data BreachCloud SecurityPolicy and Compliance

Impact Scope

People Affected

Potentially millions of customers and employees

Affected Companies

Tata Motors

Industries Affected

ManufacturingRetail

Geographic Impact

India (global)

Related Entities

Other

Tata Motors

Full Report

Executive Summary

A severe data breach at Indian automotive giant Tata Motors has exposed over 70 terabytes of highly sensitive data. The incident, first discovered in 2023, was caused by a series of fundamental security misconfigurations, most notably the exposure of plaintext Amazon Web Services (AWS) access keys on a public-facing e-commerce website. These overly permissive credentials allowed unauthorized individuals to access a vast number of AWS S3 buckets. The exposed data includes customer databases with personally identifiable information (PII), financial records, fleet management data, and internal corporate reports, representing a catastrophic failure in cloud security management.


Threat Overview

The root cause of the breach was a set of AWS access keys discovered in plaintext within the code of E-Dukaan, Tata Motors' e-commerce platform for vehicle spare parts. This is a classic example of hardcoded secrets, a common but critical security vulnerability. The exposed keys were not properly restricted and granted sweeping permissions, including read and write access to numerous S3 buckets.

Key Failures:

  • Hardcoded Credentials: AWS access keys were embedded directly into the client-side code of a public website.
  • Overly Permissive IAM Policy: The keys were configured with excessive permissions, violating the principle of least privilege.
  • Insecure API Endpoints: In addition to the exposed keys, the investigation found other inadequately secured API endpoints that further expanded the attack surface.
  • Lack of Monitoring: The exfiltration of such a large volume of data went undetected, indicating a lack of effective cloud security monitoring.

Technical Analysis

The attack path was straightforward. An attacker could simply inspect the source code of the E-Dukaan website, find the accessKeyId and secretAccessKey, and use them with the AWS Command Line Interface (CLI) or API to list and access the S3 buckets associated with the account. The exposed data was extensive and included:

  • Customer databases with PII, including PAN numbers (Indian tax ID).
  • Approximately 40 gigabytes of administrative order reports.
  • Hundreds of thousands of invoices.
  • Market intelligence reports and other internal corporate data.
  • Data from FleetEdge, Tata Motors' fleet management system.

A striking detail from the report notes that the powerful, exposed keys were used for a trivial task: downloading a single 4-kilobyte file of tax codes. This highlights a profound disconnect between the permissions granted and the actual operational need, creating a massive and unnecessary security risk.

Impact Assessment

The exposure of 70 terabytes of data has severe consequences for Tata Motors:

  • Customer Harm: Millions of customers are at risk of identity theft, fraud, and targeted phishing attacks due to the exposure of their PII and purchase history.
  • Competitive Disadvantage: The leak of internal market intelligence, sales data, and administrative reports provides competitors with a significant advantage.
  • Regulatory Penalties: The breach likely violates data protection regulations in India and other jurisdictions, leading to substantial fines.
  • Reputational Damage: This incident severely damages trust in the Tata Motors brand among customers, partners, and investors.
  • Operational Risk: Exposure of data from the FleetEdge system could introduce risks to the physical security and logistics of managed vehicle fleets.

Detection & Response

  • Cloud Security Posture Management (CSPM): Deploy CSPM tools to continuously scan cloud environments for misconfigurations like public S3 buckets, overly permissive IAM policies, and hardcoded secrets.
  • Secret Scanning: Integrate automated secret scanning tools into CI/CD pipelines to prevent credentials from ever being committed to code repositories.
  • CloudTrail Analysis (D3-DAM): Regularly analyze AWS CloudTrail logs for anomalous activity, such as access to sensitive buckets from unusual IP addresses or an abnormally high number of GetObject API calls.

Mitigation

  • Secrets Management: Never hardcode credentials in source code. Use a dedicated secrets management solution like AWS Secrets Manager or HashiCorp Vault to store and dynamically retrieve credentials at runtime.
  • IAM Best Practices (D3-UAP): Strictly adhere to the principle of least privilege. Instead of long-lived access keys, use temporary credentials and IAM Roles with narrowly scoped policies that grant only the permissions necessary for a specific task.
  • S3 Bucket Policies: Configure S3 buckets to be private by default. Use S3 Block Public Access settings and implement bucket policies that restrict access to specific IAM roles or VPC endpoints.
  • Data Classification and Encryption (D3-FE): Classify data based on sensitivity and apply encryption at rest (using SSE-S3 or SSE-KMS) and in transit (enforcing TLS) for all data stored in S3.

Timeline of Events

1
January 1, 2023
The security vulnerability and data exposure were first discovered sometime in 2023.
2
October 29, 2025
This article was published

MITRE ATT&CK Mitigations

Prevent hardcoding of secrets in application code by using secure secrets management solutions.

Enforce the principle of least privilege on all IAM users and roles, ensuring they have only the minimum permissions required.

Audit

M1047enterprise

Continuously audit cloud configurations and logs for signs of misconfiguration or anomalous access.

Encrypt all sensitive data at rest in S3 buckets to add another layer of protection in case of unauthorized access.

D3FEND Defensive Countermeasures

The root cause of the Tata Motors breach was a failure in application configuration, specifically hardcoding AWS keys. To prevent this, development teams must adopt a 'no hardcoded secrets' policy. This should be enforced through both process and technology. Implement pre-commit hooks and CI/CD pipeline checks that scan code for patterns matching access keys, API tokens, and other secrets. Instead of embedding credentials, applications like E-Dukaan should be configured to use a secrets management service (e.g., AWS Secrets Manager) or IAM Roles for EC2/ECS to dynamically and securely fetch credentials at runtime. This eliminates the risk of keys being exposed in source code.

The second major failure was the overly permissive nature of the exposed keys. All IAM policies, whether for users or roles, must adhere strictly to the principle of least privilege. For the E-Dukaan application, the IAM role should have only been granted permissions to perform its specific function, such as s3:GetObject on a specific, non-sensitive bucket containing tax codes. It should never have had permissions to list all buckets or access customer data. Organizations should use tools like AWS IAM Access Analyzer to identify and remediate excessive permissions and regularly review policies to ensure they remain as restrictive as possible.

Effective monitoring could have detected this breach early. Organizations must enable and analyze AWS CloudTrail logs. For the Tata Motors scenario, security teams should have configured alerts for several high-risk activities. These include: any API call made using a long-lived IAM user's access keys (as roles are preferred), a ListBuckets call from an unexpected source, or an unusual volume of GetObject calls from a single user or IP address. Ingesting CloudTrail logs into a SIEM and correlating them with threat intelligence and network data can help identify when a compromised key is being used for reconnaissance or data exfiltration, enabling a much faster response.

Sources & References

Massive Tata Motors Data Leak Exposes 70TB of Sensitive and Test Drive Information
Cyber Security News (cybersecuritynews.com) October 29, 2025
(Placeholder)
Example (example.com) October 29, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data LeakAWSS3 BucketMisconfigurationCloud SecurityTata MotorsPII

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading