A severe data breach at Indian automotive giant Tata Motors has exposed over 70 terabytes of highly sensitive data. The incident, first discovered in 2023, was caused by a series of fundamental security misconfigurations, most notably the exposure of plaintext Amazon Web Services (AWS) access keys on a public-facing e-commerce website. These overly permissive credentials allowed unauthorized individuals to access a vast number of AWS S3 buckets. The exposed data includes customer databases with personally identifiable information (PII), financial records, fleet management data, and internal corporate reports, representing a catastrophic failure in cloud security management.
The root cause of the breach was a set of AWS access keys discovered in plaintext within the code of E-Dukaan, Tata Motors' e-commerce platform for vehicle spare parts. This is a classic example of hardcoded secrets, a common but critical security vulnerability. The exposed keys were not properly restricted and granted sweeping permissions, including read and write access to numerous S3 buckets.
Key Failures:
The attack path was straightforward. An attacker could simply inspect the source code of the E-Dukaan website, find the accessKeyId and secretAccessKey, and use them with the AWS Command Line Interface (CLI) or API to list and access the S3 buckets associated with the account. The exposed data was extensive and included:
FleetEdge, Tata Motors' fleet management system.A striking detail from the report notes that the powerful, exposed keys were used for a trivial task: downloading a single 4-kilobyte file of tax codes. This highlights a profound disconnect between the permissions granted and the actual operational need, creating a massive and unnecessary security risk.
The exposure of 70 terabytes of data has severe consequences for Tata Motors:
GetObject API calls.
Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.