Malware & RansomwareHIGH

Malware Attack - Drivers Stranded by Breathalyzer Company

TCTechCrunch SecurityΒ·Reporting by Zack Whittaker
πŸ“° 2 sourcesΒ·Summary by CyberPings EditorialΒ·AI-assistedΒ·Reviewed by Rohit Rana
Updated:
🎯

Basically, a cyberattack made it impossible for some drivers to start their cars.

Quick Summary

A cyberattack on Intoxalock has stranded drivers across the U.S. Many can't start their vehicles due to calibration issues. The situation is ongoing, and users are advised to stay updated.

What Happened

On March 14, 2026, a cyberattack targeted Intoxalock, a company that provides breathalyzer devices for vehicles. These devices are essential for individuals required to pass a breath test before starting their cars. Following the attack, Intoxalock reported that it was experiencing significant downtime, which has left many drivers unable to start their vehicles. The company confirmed the incident through a spokesperson, who stated they paused some systems as a precaution.

The impact of this attack has been widespread, affecting drivers from New York to Minnesota. Many users have reported being unable to start their vehicles due to missed calibrations, which are necessary for the breathalyzer devices to function correctly. As a result, some drivers have found themselves stranded, unable to drive for days.

Who's Affected

The cyberattack has affected a large number of drivers, particularly those who rely on Intoxalock's technology. The company operates in 46 states and serves approximately 150,000 drivers annually. Reports indicate that some drivers have been unable to access their vehicles, leading to frustration and confusion. Auto shops are also feeling the pressure, with some reporting cars parked for extended periods due to the inability to calibrate breathalyzer devices.

As the situation unfolds, more drivers are likely to be impacted as the company works to resolve the issues caused by the cyberattack. The lack of clear communication from Intoxalock regarding the nature of the attack adds to the uncertainty.

What Data Was Exposed

While Intoxalock has not disclosed the specific details of the cyberattack, it remains unclear whether sensitive data has been compromised. The company has not confirmed if it was a ransomware attack or if any ransom demands were made. This lack of information raises concerns about potential data breaches and the security of user information.

As the company investigates the incident, it is crucial for affected users to remain vigilant. They should monitor their accounts and be aware of any suspicious activity that may arise as a result of this attack.

What You Should Do

If you are an Intoxalock user experiencing issues, it is advisable to stay updated through the company's official channels. Be patient as the company works to restore normal operations. In the meantime, consider alternative transportation options if you find yourself unable to start your vehicle.

Additionally, if you suspect your data may be at risk, consider changing passwords and monitoring your financial accounts for any unusual activity. Cybersecurity awareness is essential during such incidents, as the implications can extend beyond immediate access issues.

πŸ”’ Pro insight: This incident highlights vulnerabilities in vehicle security systems reliant on third-party technology, necessitating a reevaluation of cybersecurity protocols.

Original article from

TCTechCrunch SecurityΒ· Zack Whittaker
Read Full Article

Also covered by

WIWired Security

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Read Article
ARArs Technica Security

After hackers hit an Iowa company, cars around the country failed to start

Read Article

Related Pings

HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security AffairsΒ·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security AffairsΒ·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro ResearchΒ·
HIGHMalware & Ransomware

Brokk Hacked - Play Ransomware Exposes Sensitive Data

Brokk has reportedly been hacked by Play ransomware, leading to the leak of sensitive corporate data. This incident could severely impact the company's reputation and security. Organizations must bolster their defenses to prevent similar breaches.

SC MediaΒ·
HIGHMalware & Ransomware

Chaos Malware - New Targeting of 64-bit Linux Servers

Chaos malware has evolved to target 64-bit Linux servers, expanding its attack surface. This shift raises alarms for organizations relying on these systems. Enhanced security measures are now crucial to protect against potential larger-scale attacks.

SC MediaΒ·
HIGHMalware & Ransomware

Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics

The notorious Phorpiex botnet is back, spreading ransomware and sextortion schemes. Millions are at risk as it targets users globally. Stay alert and protect your devices from this evolving threat.

Cyber Security NewsΒ·