Stellantis — the automaker behind brands like Chrysler, Fiat, Jeep, Dodge, and Ram — has revealed that a cybersecurity breach at a third-party service provider supporting its North American customer service operations exposed customer “contact information,” though the company says financial or highly sensitive personal data were not compromised. Reports from BleepingComputer indicate that the extortion group ShinyHunters claims responsibility, stating that some 18 million records from its Salesforce instance were stolen. Stellantis has activated its incident response protocol, is notifying affected customers, alerted law enforcement, and is warning people to watch for phishing attempts.
Sources: BleepingComputer, Detroit Free Press
Key Takeaways
– Scope of Data Compromised: The breach involved contact information (names, email addresses, etc.), but not financial data or what Stellantis deems “sensitive personal information.”
– Volume & Attribution: Up to 18 million records are claimed stolen. The hacker group ShinyHunters has taken credit, and the breach appears tied to a Salesforce instance via a third-party vendor.
– Company Response & Risk Mitigation: Stellantis has initiated its incident response protocols, is informing affected customers and authorities, and is urging vigilance around phishing.
In-Depth
The recent breach at Stellantis underscores a growing trend: large companies increasingly being compromised through third-party vendor relationships rather than direct intrusions. Stellantis, which includes Jeep, Dodge, Ram, Fiat, Chrysler, and others, confirmed that unauthorized access was gained via a vendor whose platform supports its North American customer service operations. The company reports the exposed data was limited to contact information; no financial identifiers or other deeply sensitive personal details were accessed, per Stellantis.
While the automaker has not fully detailed every facet of what was taken or how many customers are impacted, a claim by the hacking collective ShinyHunters — reported in BleepingComputer — alleges that approximately 18 million records from Stellantis’s Salesforce instance were exfiltrated. The records reportedly include names and contact details. Stellantis did not confirm that exact number but neither did it fully refute it. There are open questions about what specific third-party vendor was breached, what security gaps allowed the breach, and how well customer data was segmented to minimize damage.
In response, Stellantis says it immediately activated its incident response protocols, alerted law enforcement, and began notifying affected customers. The company is urging its users to remain vigilant, particularly against phishing—the technique often used by bad actors to exploit exposed contact info. For customers of Stellantis brands, the risk is that even contact info can be misused: spam, phishing, identity verification bypass attempts, or social engineering attacks. While there is relief that more sensitive personal or financial information appears untouched, the scale of the exposure still poses tangible threats.
This incident also raises broader concerns about vendor risk, especially in industries with complex supply chains and many third-party integrations. When a vendor has access to large customer datasets, or serves as a bridge to critical customer service platforms like Salesforce, a single vulnerability or lapse can cascade widely. For companies, this suggests a need to review vendor contracts, enforce stricter security audits, ensure minimal privileges, and partition data in ways that limit exposure. For consumers, it’s increasingly vital to monitor one’s financial and communication channels and be especially cautious when receiving unusual messages from companies or brands one interacts with.

