Automotive rental large Hertz Company warns it suffered an information breach after buyer knowledge for its Hertz, Thrifty, and Greenback manufacturers was stolen within the Cleo zero-day knowledge theft assaults.
“On February 10, 2025, we confirmed that Hertz knowledge was acquired by an unauthorized third celebration that we perceive exploited zero-day vulnerabilities inside Cleo’s platform in October 2024 and December 2024,” reads the Hertz knowledge breach notification.
“Hertz instantly started analyzing the information to find out the scope of the occasion and to establish people whose private info might have been impacted.”
The corporate says that the information varies per particular person however may comprise clients’ names, contact info, date of beginning, bank card info, driver’s license info, and data associated to employees’ compensation claims.
As well as, Hertz says a small quantity might have had their Social Safety numbers or authorities identification stolen.
“A really small variety of people might have had their Social Safety or different authorities identification numbers, passport info, Medicare or Medicaid ID (related to employees’ compensation claims), or injury-related info related to automobile accident claims impacted by the occasion,” warned Hertz.
Whereas Hertz has not shared what number of clients have been impacted by the incident, Maine’s Legal professional Basic’s Workplace experiences that 3,409 folks within the state are receiving notifications. The notifications have been additionally shared with California and Vermont, which don’t report the variety of impacted folks within the state.
Hertz is now providing clients two years of free identification monitoring providers and advising these impacted to be looking out for potential fraud.
Whereas Hertz says it has not detected “any misuse of non-public info for fraudulent functions,” the Clop ransomware gang beforehand leaked the corporate’s knowledge on their extortion web site.

Supply: BleepingComputer
In October 2024, Clop mass-exploited a zero-day vulnerability in Cleo managed file switch platforms: Cleo Concord, VLTrader, and LexiCom.
Clop later claimed accountability for the assaults, stating they stole the information for 66 corporations.
Different corporations who confirmed or stated they have been investigating knowledge breaches from the Cleo knowledge theft assaults embody Western Alliance Financial institution, WK Kellogg Co, and Sam’s Membership.
The Clop ransomware gang, aka TA505 and Cl0p, launched in March 2019, when it first started focusing on corporations with ransomware.
Nevertheless, since 2020, the ransomware gang has targeted extra on knowledge theft assaults, focusing on beforehand unknown zero-day vulnerabilities in safe file switch platforms to steal knowledge.
This stolen knowledge is then used to extort corporations for hundreds of thousands of {dollars} to stop the recordsdata from leaking.
Earlier Clop knowledge theft assaults additionally focused MOVEit Switch, GoAnywhere MFT, SolarWinds Serv-U, and Accelion FTA safe file switch platforms.