Excerpt from Hackread.com Article, Published on January 12, 2026

Everest Ransomware has claimed responsibility for a large – scale cyber incident involving Nissan Motor Corporation. The ransomware group published details of the alleged breach on its dark web leak site. The post claims that attackers accessed Nissan’s internal systems and extracted nearly 900GB of data.

According to the disclosure, the stolen data includes compressed archives, spreadsheets, and internal documents. Screenshots shared by the group show files in formats such as Excel, CSV, ZIP, and text documents. These files appear to contain operational records and internal business information. While the samples do not clearly show customer personal data, the file structure suggests deep system access.

The attackers issued a deadline of five days for Nissan to respond. If the company fails to engage, the group threatens to release the data publicly. This tactic reflects the growing trend of double – extortion attacks. Cybercriminals now steal data before encrypting systems to increase pressure on victims.

Security analysts warn that even non – personal data can create serious risks. Internal documents can expose workflows, vendor details, and system layouts. Attackers often use this information for follow – up attacks or targeted phishing campaigns. Large enterprises like Nissan remain attractive targets due to their global operations and complex infrastructure.

Nissan has faced cybersecurity challenges in the past. Earlier incidents impacted employee and customer records across different regions. These repeated events highlight the difficulty of securing large digital ecosystems. They also show the importance of strong access controls, monitoring, and incident response planning.

This incident further demonstrates the aggressive activity of Everest Ransomware across industries. The group has targeted several high – profile organizations in recent months. Its focus on data theft shows how ransomware threats continue to evolve beyond simple encryption attacks.

As of now, Nissan has not publicly confirmed the breach. Investigations may clarify the scope and impact in the coming days. Organizations worldwide continue to monitor the situation closely.

To delve deeper into this topic, Visit Hackread.com .