wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/06\/09\/shell-recharge-security-lapse-exposed-drivers-data\/<\/a><\/br> Oil giant Shell said it is investigating after a security researcher found an exposed internal database spilling the personal information of drivers who use the company\u2019s electric vehicle charging stations.<\/p>\n Security researcher Anurag Sen<\/a> found a database online that contained close to a terabyte of logging data relating to Shell Recharge, the company\u2019s worldwide network of hundreds of thousands of electric vehicle charging stations, which it acquired in part from Greenlots in 2019<\/a>. Greenlots provided electric vehicle (EV) charging services and technology for customers operating vehicle fleets.<\/p>\n The internal database, hosted on Amazon\u2019s cloud, contained millions of logs, said Sen, including details about customers who used the EV charging network. The database had no password, allowing anyone on the internet to access its data from their web browser.<\/p>\n The data, seen by TechCrunch, contained names, email addresses, and phone numbers of fleet customers who use the EV charging network. The database included the names of fleet operators, which identified organizations \u2014 such as police departments \u2014 with vehicles that recharge on the network. Some of the data included vehicle identification numbers, or VINs.<\/p>\n Sen said the database also contained the locations of Shell\u2019s EV charging stations, including private residential charging points. One of the exposed records seen by TechCrunch contained a residential address belonging to Greenlots CEO Andreas Lips.<\/p>\n It\u2019s not clear what resulted in the database becoming publicly exposed, or how long the data was public \u2014 though some of the information is as recent as 2023.<\/p>\n Sen said he contacted Shell after discovering the exposed database. TechCrunch alerted Shell after Sen said he did not hear back from the company. A short time after TechCrunch contacted Shell, the database became inaccessible.<\/p>\n Shell spokesperson Anna Arata told TechCrunch in a statement: \u201cShell has taken steps to contain and identify an exposure of Shell Recharge Solutions data. We are investigating the incident, continue to monitor our IT systems, and will take any necessary future actions accordingly.\u201d<\/p>\n Sen has previously found exposed data belonging to Amazon<\/a>, Hotai Motor<\/a>, PeopleGrove<\/a>\u00a0and JusTalk<\/a>. Earlier this year, Sen discovered a database containing sensitive U.S. military emails<\/a> belonging to U.S. Special Operations Command.<\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nShell Recharge security lapse exposed EV drivers\u2019 data<\/br>
\n2023-06-09 22:07:06<\/br><\/p>\n