Hertz Data Breach 2025: Cleo Vulnerability Exposes Sensitive Customer Information

Apr 22, 2025

In early 2025, Hertz Corporation disclosed a significant data breach resulting from vulnerabilities in Cleo's file-transfer software. The breach, which occurred between October and December 2024, led to unauthorized access to sensitive customer data.

Key Facts

Key Fact

Details

Breach Period

October–December 2024

Discovery Date

February 10, 2025

Data Analysis Completion

April 2, 2025

Affected Individuals

Over 3,400 residents in Maine; total number not disclosed

Compromised Data

Names, contact details, birth dates, credit card info, driver's license numbers, and in some cases, Social Security and passport numbers

Hertz's Network Status

No evidence of compromise

Regulatory Actions

Incident reported to law enforcement and regulatory authorities

Financial Impact

No immediate material effect; 2024 revenue stood at $9 billion

Technical Details

The breach exploited two critical vulnerabilities in Cleo's file-transfer products:​

  • CVE-2024-50623: An unrestricted file upload and download vulnerability

  • CVE-2024-55956: Allows unauthenticated users to execute arbitrary bash or PowerShell commands​

These vulnerabilities were part of a broader exploitation campaign attributed to the Clop ransomware group, which had previously targeted similar file-transfer systems.​

Broader Context

Hertz is among several organizations affected by the Cleo software vulnerabilities. Other companies, such as WK Kellogg and Sam's Club, have also reported incidents linked to the same flaws. The Clop ransomware group, known for its extensive cyberattack campaigns, has listed Hertz on its leak site, although it's unclear if any ransom demands were made.​

Implications

This incident underscores the risks associated with third-party software vulnerabilities, especially in widely used file-transfer systems. Organizations are advised to:​

  • Regularly update and patch third-party software

  • Monitor for unusual activity in file-transfer systems

  • Implement robust incident response plans​

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline
Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline
Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline
Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Oct 13, 2025

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries
Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries
Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries
Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Oct 10, 2025

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign
New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign
New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign
New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

Oct 10, 2025

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities
CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities
CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities
CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

Sep 26, 2025

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard
Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard
Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard
Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Sep 22, 2025

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign
Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign
Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign
Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Sep 19, 2025

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.