Stellantis Hacked — RAM, Dodge & Jeep Owners Could be Phished Soon

Stellantis revealed on Sunday that a third-party service provider supporting its North American customer service operation had been breached by cybercriminals. While the automaker insists that only basic contact information was exposed—names, email addresses, and phone numbers—what might seem benign on its face has created a rich opportunity for phishing, impersonation, and other downstream attacks.

According to Stellantis, the intrusion did not occur within its own systems, but via a compromised third-party vendor platform tied to customer-service operations. The hacker group ShinyHunters has claimed credit, alleging they exfiltrated more than 18 million customer records containing contact details. Stellantis maintains that no financial data or deeply sensitive personal information was compromised.

Upon discovering the breach, the company activated incident-response protocols, notified authorities, and began directly alerting affected customers.

Why Contact Data Matters More Than You Think

It might be tempting to dismiss a breach involving “just” contact information. But in cybersecurity, even seemingly innocuous data can fuel more sophisticated attacks:

  • Spear-phishing becomes more credible. When attackers already know a customer’s name, email, and phone number, they can compose messages that appear authentic and personalized.
  • Privilege escalation or impersonation. Scammers may pose as Stellantis support, dealers, or related entities to coax additional sensitive details such as VIN numbers, service histories, or payment information.
  • Credential stuffing and account takeover. If reused passwords or linked accounts are in play, criminals can probe for entry points into anything from email to financial accounts.
  • Pretext planning. The contact data may merely be reconnaissance to set up a more damaging attack later.

Exposure of contact lists is a classic first step in the playbook of advanced fraud campaigns.Stellantis is not alone. The automotive industry has increasingly become a tempting target for cybercriminals, as cars grow more connected, supply chains stretch globally, and OEMs outsource critical systems to third parties. Just weeks ago, Jaguar Land Rover suffered a severe cyber disruption that forced factory closures.

Every external link—dealer systems, customer service platforms, telematics vendors, software supply chains—adds attack surface. Even if automakers maintain robust internal defenses, a weak link in a partner’s infrastructure can undo it all.

Stellantis’ Response Should Go Beyond Disclosure

  • Comprehensive audit of vendor security. Since the breach began outside Stellantis’ perimeter, the security posture and monitoring of all third-party providers must be reassessed.
  • Red team / threat simulation. Simulated attacks can reveal how exposed data might be exploited.
  • Compensatory controls. Steps like anomaly detection on email, SMS, or call campaigns could help limit abuse.
  • Transparent communication. Customers need regular updates on risk mitigation and progress to maintain trust.

What Customers Must Do

  • Raise your guard on unsolicited contact. Calls, texts, or emails referencing your vehicle or service history should be treated skeptically, especially if they request immediate action.
  • Confirm all communications. Verify through official websites or contact numbers.
  • Monitor account activity. Keep an eye on email and financial accounts for signs of unauthorized access.
  • Use strong, unique passwords. Protect any Stellantis-related or auto-service accounts with strong two-factor credentials.

The Stellantis breach offers a potent reminder: in the modern automotive era, the data perimeter extends far beyond proprietary servers. Digital services, supply chains, and customer interfaces form a sprawling, interconnected web—and attackers are adept at finding the weakest strand.

Recent reporting indicates that this breach may be linked to a broader wave of attacks targeting Salesforce and connected platforms. The hacker collective ShinyHunters has claimed responsibility, asserting that more than 18 million records—primarily names and contact details—were exfiltrated from Stellantis’ Salesforce instance. Although Stellantis has not confirmed the total number of records accessed, the attackers’ method reportedly involved abusing OAuth tokens tied to third-party integrations.