Tata Motors data breach
Published on
5 min read

Tata Motors Fixes Cloud Security Flaws That Exposed Customer And Corporate Data

In Focus

  • Tata Motors data breach confirmed with major security flaws now resolved
  • The cloud credentials leak traced to hard-coded AWS keys in the E-Dukaan spare-parts portal
  • Tata Motors data breach exposed 70 TB customer data, including personal records and internal business dashboards

In a major development for automotive enterprises and digital B2B operations, Tata Motors has confirmed it addressed a series of security vulnerabilities that resulted in the exposure of both internal company and customer information. According to a report by TechCrunch, the incident stems from a cloud access issue tied to a public-facing portal.

What Caused The Exposure And How It Was Fixed?

The process of the exposure began with hard-coded Amazon Web Services credentials embedded in the source code of Tata Motors “E-Dukaan” spare-parts e-commerce portal, which services its commercial vehicle business.

This mis-configuration allowed access to corporate cloud-storage buckets, dashboards and operational data. On 26 September, 2025, A major cybersecurity incident emerged in India, as a India Bank data breach exposed sensitive financial records belonging to Indian businesses and individual customers.

Once the credentials were exposed, more than 70 terabytes of data were reportedly accessible. This included customer invoices with names, addresses and Permanent Account Numbers (PANs), internal financial and dealer-performance dashboards, and fleet-tracking records.

Tata Motors communications head Sudeep Bhalla, as stated by TechCrunch – “We can confirm that the reported flaws and vulnerabilities were thoroughly reviewed following their identification in 2023 and were promptly and fully addressed.” The company reported the fixes had been implemented in 2023, although it did not specify whether or when affected customers were notified of the incident.

  • Exposure route: hard-coded AWS keys in a public portal
  • Data impacted: customer PII, internal dashboards, dealer and fleet data
  • Remediation: review and fixes in 2023, but customer-notification timeline unclear

What Matters Most?

  • The root cause was a cloud credential mis-configuration via a portal code base.
  • The breach’s volume and scope make it one of the larger recent manufacturing-sector exposures.
  • Remediation is confirmed, but the transparency around customer notification remains incomplete.

Strategic Outlook For The Industry

The Tata Motors incident drives home the fact that as manufacturers increasingly integrate digital and supply-chain services across geographies, the attack surface broadens significantly. Recently, Salesforce has faced a data breach where hackers threaten to leak 1 billion records of its customers.

The operational footprint of Tata Motors, global manufacturing, commercial-vehicle service networks, digital parts-ordering, connected-fleet data, magnifies the risk when seemingly simple security mis-steps occur.

Enterprises should consider:

  • Conduct third-party audits of cloud access and public portal code.
  • Expand data-asset visibility to include dealer and fleet information.
  • Maintain clear, compliant incident-notification procedures.
  • Enforce strong cloud-security hygiene and credential controls.

Final Observations

The resolution of the Tata Motors data breach incident marks an important milestone for enterprise risk management in industrial sectors. It reinforces that the Tata Motors data breach, and its associated Tata Motors customer data exposure and Tata Motors cloud credentials leak, were precipitated by a gap in cloud-credential governance. This gap exposed more than 70 terabytes of data.

Manufacturing organizations transforming into digital service providers must view cybersecurity not as a tertiary function but as a core operational imperative for business resilience and partner trust.

Silvia Hart
X

Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as Necessary are stored on your browser as they are essential for enabling the ... Show More

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as Necessary are stored on your browser as they are essential for enabling the basic functionalities of the site.

We also use third-party cookies that help us analyze how you use this website, store your preferences, and provide the content and advertisements that are relevant to you. These cookies will only be stored in your browser with your prior consent.

You can choose to enable or disable some or all of these cookies but disabling some of them may affect your browsing experience.

Show Less

Necessary Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No Cookie to display

Analytics

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No Cookie to display

Advertisement

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No Cookie to display
Scroll to Top