Massive 70TB Data Leak at Tata Motors from Exposed AWS Keys

Massive 70TB Data Leak at Tata Motors from Exposed AWS Keys

MEDIUM
October 29, 2025
4m read

Full Report

Executive Summary

A severe data breach at Indian automotive giant Tata Motors has exposed over 70 terabytes of highly sensitive data. The incident, first discovered in 2023, was caused by a series of fundamental security misconfigurations, most notably the exposure of plaintext Amazon Web Services (AWS) access keys on a public-facing e-commerce website. These overly permissive credentials allowed unauthorized individuals to access a vast number of AWS S3 buckets. The exposed data includes customer databases with personally identifiable information (PII), financial records, fleet management data, and internal corporate reports, representing a catastrophic failure in cloud security management.


Threat Overview

The root cause of the breach was a set of AWS access keys discovered in plaintext within the code of E-Dukaan, Tata Motors' e-commerce platform for vehicle spare parts. This is a classic example of hardcoded secrets, a common but critical security vulnerability. The exposed keys were not properly restricted and granted sweeping permissions, including read and write access to numerous S3 buckets.

Key Failures:

  • Hardcoded Credentials: AWS access keys were embedded directly into the client-side code of a public website.
  • Overly Permissive IAM Policy: The keys were configured with excessive permissions, violating the principle of least privilege.
  • Insecure API Endpoints: In addition to the exposed keys, the investigation found other inadequately secured API endpoints that further expanded the attack surface.
  • Lack of Monitoring: The exfiltration of such a large volume of data went undetected, indicating a lack of effective cloud security monitoring.

Technical Analysis

The attack path was straightforward. An attacker could simply inspect the source code of the E-Dukaan website, find the accessKeyId and secretAccessKey, and use them with the AWS Command Line Interface (CLI) or API to list and access the S3 buckets associated with the account. The exposed data was extensive and included:

  • Customer databases with PII, including PAN numbers (Indian tax ID).
  • Approximately 40 gigabytes of administrative order reports.
  • Hundreds of thousands of invoices.
  • Market intelligence reports and other internal corporate data.
  • Data from FleetEdge, Tata Motors' fleet management system.

A striking detail from the report notes that the powerful, exposed keys were used for a trivial task: downloading a single 4-kilobyte file of tax codes. This highlights a profound disconnect between the permissions granted and the actual operational need, creating a massive and unnecessary security risk.

Impact Assessment

The exposure of 70 terabytes of data has severe consequences for Tata Motors:

  • Customer Harm: Millions of customers are at risk of identity theft, fraud, and targeted phishing attacks due to the exposure of their PII and purchase history.
  • Competitive Disadvantage: The leak of internal market intelligence, sales data, and administrative reports provides competitors with a significant advantage.
  • Regulatory Penalties: The breach likely violates data protection regulations in India and other jurisdictions, leading to substantial fines.
  • Reputational Damage: This incident severely damages trust in the Tata Motors brand among customers, partners, and investors.
  • Operational Risk: Exposure of data from the FleetEdge system could introduce risks to the physical security and logistics of managed vehicle fleets.

Detection & Response

  • Cloud Security Posture Management (CSPM): Deploy CSPM tools to continuously scan cloud environments for misconfigurations like public S3 buckets, overly permissive IAM policies, and hardcoded secrets.
  • Secret Scanning: Integrate automated secret scanning tools into CI/CD pipelines to prevent credentials from ever being committed to code repositories.
  • CloudTrail Analysis (D3-DAM): Regularly analyze AWS CloudTrail logs for anomalous activity, such as access to sensitive buckets from unusual IP addresses or an abnormally high number of GetObject API calls.

Mitigation

  • Secrets Management: Never hardcode credentials in source code. Use a dedicated secrets management solution like AWS Secrets Manager or HashiCorp Vault to store and dynamically retrieve credentials at runtime.
  • IAM Best Practices (D3-UAP): Strictly adhere to the principle of least privilege. Instead of long-lived access keys, use temporary credentials and IAM Roles with narrowly scoped policies that grant only the permissions necessary for a specific task.
  • S3 Bucket Policies: Configure S3 buckets to be private by default. Use S3 Block Public Access settings and implement bucket policies that restrict access to specific IAM roles or VPC endpoints.
  • Data Classification and Encryption (D3-FE): Classify data based on sensitivity and apply encryption at rest (using SSE-S3 or SSE-KMS) and in transit (enforcing TLS) for all data stored in S3.

Timeline of Events

1
October 29, 2025
This article was published

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.