ACTIVE EXPLOITATION DETECTED

CarGurus Data Breach

Status: Confirmed / Data Published
12.5M+ Records
Feb 2026 Breach
Feb 2026 Data Posted
9/10 Severity
High Threat Level

Breach Intelligence Summary

Entity: CarGurus · Actor: ShinyHunters · Source: Dark web leak site / HIBP / ObscureIQ intelligence
Attack: Voice-phishing (vishing) via SSO credential compromise
Timeline: Breach (Feb 13, 2026) · Reported (Feb 21, 2026) · Leak (Feb 23, 2026)
Exposure: 12.5M+ records · Email, Full Name, Phone, Address, IP, Finance pre-qualification metadata
Status: Confirmed / Data Published · Risk: High (Identity theft + auto-loan fraud)

Summary

In mid-February 2026, ShinyHunters claimed to have breached CarGurus, Inc., a major online automotive marketplace serving buyers, dealers, and financing workflows.

After issuing a public extortion demand with a February 20 deadline, the actor released a substantially larger dataset when payment was not made.

Current breach intelligence reflects 12M+ records, far above the initial 1.7M claim, including historical account data extending back to 2006.

CarGurus stated it secured the affected environment and launched a third-party investigation. Final scope assessments may continue to evolve as forensics progress.

Because this dataset intersects with vehicle purchase intent and finance context, downstream phishing and fraud risk is materially elevated.

About CarGurus

CarGurus is a U.S.-based automotive marketplace connecting buyers, dealers, and financing partners.

The platform supports:

  • Vehicle listings and dealer subscriptions
  • Buyer accounts and inquiry workflows
  • Finance pre-qualification journeys
  • Dealer and corporate data integrations

If you created an account, submitted financing details, inquired about vehicles, or operated a dealership profile, your data may be included.

Threat Actor: ShinyHunters

This incident aligns with recent social-engineering-first campaigns targeting SSO and identity infrastructure rather than direct exploitation of core production systems.

Reported intrusion pattern includes:
  • Voice phishing call impersonating internal IT
  • Claims of urgent SSO/MFA maintenance
  • Victim redirected to a customized phishing page
  • Real-time credential + MFA interception
  • SSO access used to pivot into connected platforms

Breach Exploitation Status

Threat Activity: High
Signal Status
Dark web marketplace listings Detected
Credential stuffing list overlap Possible
Phishing campaign relevance Detected
Ransomware affiliate crossover Possible
Law enforcement investigation visibility Unknown
Data Longevity: 10+ years (high persistence)

Historical account coverage back to 2006, plus persistent identifiers like email, phone, and address, can sustain long-tail targeting risk.

Data Points Exposed

Verified fields in released dataset:
Email addresses
Full names
Phone numbers
Physical addresses
IP addresses
Account creation dates
User UUIDs and internal IDs
Finance pre-qualification application data
Dealer subscription and corporate records
Not confirmed in dataset:
Passwords (plaintext)
Direct authentication secrets

Dark Web Verification

Status: Confirmed / Data Published

  • Dataset has been publicly released and redistributed across breach-sharing channels.
  • Observed dataset volume exceeds early claim and aligns with large-scale historical account coverage.
  • Breach was added to Have I Been Pwned on February 22, 2026.

Impact

Risk is elevated due to automotive purchase context, finance pre-qualification signals, email + phone pairing, and IP-address linkage.

Primary downstream threats include:
  • Targeted phishing referencing vehicle interest or dealer communications
  • Auto-loan and financing fraud attempts
  • Identity theft leveraging address and profile metadata
  • SIM-swap attempts where phone numbers are present
  • Credential stuffing against reused credentials

Automotive marketplaces intersect with credit workflows, which increases criminal monetization potential.

Recommendations for Impacted Individuals

If you believe your information may be included:

Check Your Exposure
If you are an ObscureIQ client, this breach has been indexed into your exposure profile.
Non-clients may request a breach impact review.
Expect Automotive-Themed Phishing
Watch for messages referencing:
Financing approvals
Dealer follow-ups
Vehicle refund/rebate offers
Verify through official channels only.
Secure Your Email and MFA
Enable MFA immediately on email first, then finance platforms.
Email compromise is often the first pivot point.
Rotate Reused Passwords
Change your CarGurus password and any reused credentials across other services.
Monitor Credit and Loan Activity
Especially if finance pre-qualification or lending details were submitted through platform workflows.
Prepare for Long-Term Abuse
This dataset spans many years of accounts. Abuse attempts may appear months later, not just immediately after disclosure.

Frequently Asked Questions

What happened in the CarGurus data breach?

In February 2026, ShinyHunters claimed a CarGurus compromise, issued an extortion deadline, and later published a large dataset after non-payment.

What data was exposed in the CarGurus breach?

Observed fields include email addresses, names, phone numbers, addresses, IP addresses, account metadata, user IDs, and finance-related pre-qualification data.

How many records were affected in the CarGurus breach?

Current intelligence reflects 12M+ records (shown as 12.5M+), which is materially higher than the initial 1.7M claim.

Is the CarGurus breach confirmed?

Yes. Incident status is treated as confirmed with publicly available data, though final forensic scope can still change.

Is the CarGurus breach data being used by criminals?

Data circulation is detected and phishing relevance is active. Some exploitation channels (like broad credential-list overlap) remain possible pending further validation.

What should I do if I was affected by the CarGurus breach?

Rotate reused passwords, enable MFA, watch for automotive financing scams, and monitor credit and account activity over the long term.

Protect Yourself

Check If You're Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed. Free forever.

High-Risk? Get an Exposure Audit

Executives, public figures, and high-visibility operators can receive tailored exposure intelligence and hardening guidance.

Request Consultation

Corporate Accountability

CarGurus is a U.S.-based publicly traded company and may have disclosure responsibilities under applicable federal and state requirements when incidents are determined material.

Public statements indicate the affected environment was secured and third-party incident response support was engaged.

Initial breach-size claims and later dataset volume differed, highlighting why incident scope can evolve during forensic review.

Users should not rely only on early estimates when making risk decisions.

ObscureIQ Advisory

This incident matches a broader campaign targeting identity infrastructure through social engineering rather than direct code-level exploitation.

If you are:
  • A dealership operator or executive
  • A financing applicant with long-standing account history
  • A public-facing individual in automotive commerce
  • Or simply concerned about identity misuse

We can validate exposure pathways and map realistic downstream threat vectors.

Services
Audits Wipes Threat Monitoring Training

Classification Tags

ShinyHunters Vishing SSO Compromise Data Exfiltration Automotive Marketplace Finance Workflow Email Phone Address IP Address Finance Metadata