frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Hacking India's largest automaker: Tata Motors

https://eaton-works.com/2025/10/28/tata-motors-hack/
146•EatonZ•3d ago

Comments

speckx•2d ago
The fact that they put their AWS secret keys on their website is incredible.
YetAnotherNick•7h ago
Sending it with AES encryption(with the key that the client has access to) makes it even worse, as someone knew this shouldn't be shared to client yet they shared it anyway.
horns4lyfe•7h ago
If you’ve ever worked with Indian outsourcing firms it’s not
quickthrowman•7h ago
That’s exactly the kind of work I’d expect from TCS, I’m not sure why you are surprised.
darth_avocado•6h ago
Even more importantly, why do the root keys expose EVERYTHING? Do they just have one account for all of their infra?
Linkd•22m ago
The fact that it's nicely commented is even more so. Check out the other environment configs commented out, are they doing this by hand? Wild.
ksynwa•7h ago
So the author got nothing but a thank you out of it? That's a shame.
tehlike•7h ago
At least there was a "thank you".

Some go on to sue such researchers.

paxys•5h ago
Yup, they said thank you and took action only because this was a US-based researcher. Had any Indian dared to do this they'd be in for a world of pain. Not through a lawsuit, but criminal charges.
DaSHacka•6h ago
Typical 'payout' for ""responsible"" disclosure.
sharadov•7h ago
Security for most Indian companies - even conglomerates is a joke.

Look at the websites - most look like they've not been upgraded since the 90s, with endless popups

Ylpertnodi•7h ago
> endless popups

Ypu get popups? What are you using to browse? IE5?

I sometimes get 'this site is trying to open another window -allow/ block?': answer is always 'No'.

fakedang•6h ago
Not ad popups, site UI popups.

Another example, financial services publicly traded company with a recent 99% profit decline:

https://www.emkayglobal.com/

renewiltord•5h ago
In site modals.
alephnerd•7h ago
It's a side effect of pay. Like every other company, you get what you pay for, and for organizations that view web security as a [edit:] Cost Center (eg. Tata Motors) there's no incentive to pay market rate for a Security Engineer - who in India can now demand $60k-100k TCs.

Heck, firms that provide offensive security capabilities to Indian PDs can pay $40k-50k after poaching a junior pentester or exploit developer from a PD.

spelk•7h ago
Sorry to be pedantic but I think you mean 'cost center', not loss leader (something sold at a loss to attract customers into your ecosystem/store). You are entirely right otherwise.
alephnerd•6h ago
Doh! You are correct! Crossed wires during a meeting
vrinsd•5h ago
I understand why someone might this this is a pay issue, but it's goes beyond that.

Culturually, doing something "well"(quality oriented, mindful of end-users) vs. "got it done" (transaction, pragmatic way of looking at things) is the heart of why outsourcing to many different geographical areas (India included) often results in something different than expected.

Also condemning every one in one part of the world as thinking one way is certainly not fair or true, but there are definitely unmistakable trends.

alephnerd•5h ago
Becuase it is about pay.

For example, most of the security portfolio that GCP provides is developed and product managed out of the Google Hyderabad office, as is a fairly major Israeli CNAPP product that starts with "A", a large CNAPP from a public Israeli-American security company that is directly positioned against Wiz, and a major security vuln mgmt and redteaming tool used by the DoD, GitHub, and Google. But all these employers pay $60k-130k TC for mid-career security professionals in India.

We scoop up anyone who is remotely competent at transnational firms or startups because we can afford to pay Western salaries, and traditional conglomerates in India largely do not care about web exploits unless they are a web platform first and foremost.

Tata Motors - being an automotive company - does not care about web development for the same reason GM doesn't as well: it isn't tangibly connected to revenue generation. As such, they will just contract it out to TCS (a Tata Group company, but both are independent of each other) at the lowest contract rate possible.

porridgeraisin•5h ago
That culture at WITCH and WITCh adjacent companies is itself a result of the pay.
Nextgrid•4h ago
Pay should reward doing something well vs merely doing something. Of course, this would generally mean you need to pay more than the competitor which will happily pay for merely doing something. So yes it is about pay.
alephnerd•4h ago
Also, Indian companies are competing with American and Israeli founded or funded companies and startups for the same talent.

If you are competent, instead of earning $15k TC working for an automotive company, you could demand $40k-70k in TC from an MNC or a well funded startup (assuming you have the skills to back it up) - and those are the numbers my portfolio companies use to target hiring in India, as well as what I used previously before I became a VC.

Nextgrid•4h ago
Western companies have the exact same problem though; I've dealt with plenty of incompetent people there too because the organization does not reward technical excellence and quality, so it is completely pragmatic for employees to focus their time on the things that are rewarded (engaging in politics, etc) instead.

During the startup/ZIRP era there might have been people doing the "right" thing because they had skin in the game thanks to stock options or they were paid just so fucking much that they didn't care about putting in the extra work. But as total comps go downward (coupled with inflation) the output's quality tends to regress to the minimum acceptable.

trueismywork•2h ago
I dont think there's much culture when the population is just overloaded with work and traffic and stress
dyauspitr•2h ago
It is about pay. If you don’t have someone working on 5 different items continuously straining their bandwidth they tend to do better work.
thelastgallon•7h ago
Related: Jaguar Land Rover hack cost UK economy an estimated $2.5 billion, report says: https://news.ycombinator.com/item?id=45668008

The 'tech' for both these is by guess who? TCS!

Edit: For those who don't know the relation. Tata[1] is a conglomerate, which owns both Tata Motors (Jaguar, Land Rover) and also TCS (Tata Consultancy Services)

[1] https://en.wikipedia.org/wiki/Tata_Group

cjs_ac•6h ago
TCS also contracts for Marks & Spencer, and the Co-op, both of which were also taken offline by hacking earlier this year.
Mistletoe•6h ago
At what point is it more believable that these are inside jobs done on purpose vs. incompetence? I guess that’s just Hanlon’s Razor though.
cjbgkagh•6h ago
I have heard there is a growing trend of hackers paying kickbacks to insiders, certainly makes hacking easier.
CommanderData•5h ago
Having worked with Indian consultancy firms for over 10 years. I can safely say security attitudes and practices haven't changed much.

There's always this culture of taking shortcuts at the expense of security and quality.

cjbgkagh•4h ago
One of the problems with incompetence, of which there are many, is that it gives bad actors space to operate. From a security point of view I don’t think the distinction matters all that much.

That said, the situations I’ve head about were from affiliate ransomware attacks that didn’t make the news because the backup worked. It’s difficult to keep things secure from highly motivated internal bad actors. I’ve been told it’s an increasing trend but have not heard much about it publicly.

jacquesm•5h ago
It's perfectly believable. Whether it is more believable or not is a toss up. If you employ such a large number of people there are bound to be a couple of bad apples, and unless you have very good internal processes and monitoring it isn't all that hard to imagine someone doing something they shouldn't be doing. But absent hard evidence that it happened that way it interesting speculation but no more than that, besides, it can be impossible to distinguish between the two even if you have evidence of an inside job that looks like incompetence!
zdragnar•5h ago
Based on my experience working alongside TCS, incompetence seems far more likely. If we'd asked for a back door, we'd have gotten a solid wall.

Then again, my experience may have left me a little jaded.

tencentshill•3h ago
When you pay your support employees so little, it's not difficult for someone from a wealthier place to bribe them.
fencepost•5h ago
Note that M&S dropped TCS in July following the recovery. https://www.ft.com/content/289ec371-2ed4-425a-9bd0-c34e6db39... and elsewhere.
thousand_nights•4h ago
> M&S chair, told MPs that hackers had used “sophisticated impersonation” to gain entry “involving a third party.”

20 bucks says this sophisticated impersonation was social engineering a $5/hour outsourced customer support employee

> The attack is expected to lower operating profits by up to £300mn this year.

that's not counting the reputation and brand damage. M&S is seen as a premium retailer and this whole hack made them seem utterly incompetent and unreliable

> had decided to opt for another service provider after the process had completed

i wonder where this other provider is based. i think i'm gonna place another 20 bucks on this.

> The retailer continues to use the Indian group for other services.

lol.

fuzztester•2h ago
>that's not counting the reputation and brand damage. M&S is seen as a premium retailer and this whole hack made them seem utterly incompetent and unreliable

>>The retailer continues to use the Indian group for other services.

>lol.

>is seen

lol. a lot of things are seen as blah blah. doesn't mean they are blah blah.

google is seen as a world leading tech company. yet see how HNers regard them (except those desperate for FAANG salaries).

If they hired their vendors without due diligence, they may be incompetent and unreliable themselves. On the other hand:

>> M&S chair, told MPs that hackers had used “sophisticated impersonation” to gain entry “involving a third party.”

If the impersonation was sophisticated, maybe it was not so much the fault of TCS?

If it was a Western company, would you talk / think the same?

Nahi. Non. Nein. Nyet. Nada.

lol.

fuzztester•2h ago
>20 bucks says this sophisticated impersonation was social engineering a $5/hour outsourced customer support employee

0 bucks says this below list of data breaches is much much more devastating. 0 bucks, because I don't have to bet on it, unlike you, because it's true:

>https://en.wikipedia.org/wiki/List_of_data_breaches

>This is a list of reports about data breaches, using data compiled from various sources, including press reports, government news releases, and mainstream news articles. The list includes those involving the theft or compromise of 30,000 or more records, although many smaller breaches occur continually. Breaches of large organizations where the number of records is still unknown are also listed. In addition, the various methods used in the breaches are listed, with hacking being the most common.

>Most reported breaches are in North America, at least in part because of relatively strict disclosure laws in North American countries.[citation needed] 95% of data breaches come from government, retail, or technology industries.[1] It is estimated that the average cost of a data breach will be over $150 million by 2020, with the global annual cost forecast to be $2.1 trillion.[2][3] As a result of data breaches, it is estimated that in first half of 2018 alone, about 4.5 billion records were exposed.[4] In 2019, a collection of 2.7 billion identity records, consisting of 774 million unique email addresses and 21 million unique passwords, was posted on the web for sale.[5] In January 2024, a data breach dubbed the "mother of all breaches" was uncovered.[6] Over 26 billion records, including some from Twitter, Adobe, Canva, LinkedIn, and Dropbox, were found in the database.[7][8] No organization immediately claimed responsibility.[9]

>In August 2024, one of the largest data security breaches was revealed. It involved the background check databroker, National Public Data and exposed the personal information of nearly 3 billion people.[10]

silisili•1h ago
> M&S is seen as a premium retailer and this whole hack made them seem utterly incompetent and unreliable

Hiring TCS to begin with made them seem utterly incompetent and unreliable.

Let them fail and be a warning to other companies trying to cheap out on IT.

rdtsc•7h ago
> October 23, 2023: They confirm receipt and are working on taking action. After this date and up until January 2, 2024, there were various back and forth emails trying to get Tata Motors to revoke the AWS keys. I am not sure if something was lost in translation, but it took a lot of pestering and specific instructions to get it done.

Wow, they had to go out of their way and plead with Tata Motors to fix their own shit. I can only admire their patience. Can't say I would be that patient.

spprashant•6h ago
This is embarrassing.
fakedang•6h ago
I'll just leave this here:

> September 1, 2023: Tata Motors shared with CERT-IN (who then shared with me) that the issues are remediated. September 3, 2023: I confirm only 2/4 issues were remediated and the AWS keys were still present on the websites, and active. October 22, 2023: After no updates and finding the AWS issues still not remediated, I send over some more specific steps on what must be done. October 23, 2023: They confirm receipt and are working on taking action. After this date and up until January 2, 2024, there were various back and forth emails trying to get Tata Motors to revoke the AWS keys. I am not sure if something was lost in translation, but it took a lot of pestering and specific instructions to get it done.

Stay classy TCS.

paxys•5h ago
This shouldn't be a surprise for anyone who has worked with TCS contractors in the past.
yahoozoo•5h ago
Superpower by 2027.
debarshri•5h ago
This is a pessimistic comment.

I'm a cofounder of a data and identity security startup operating specifically in APAC. Data security in india a joke.

I would argue even with DPDPA, RBI C-Site and cyber resilience framework from SEBI, it is just going to not happen here.

The list PAN card the blog is taking about is probably already leaked by some other services.

The recent flipkart cash on delivery scams [1] are example of how your personal information is just out there in wild in india, open for exploitation.

There are lot of who do security in good faith (often driven by compliance) and lot of them are our customers too but I hope to see rest of indian tech ecosystem take security seriously.

[1] https://www.reddit.com/r/FuckFlipkart/comments/1hhrw9w/what_...

alephnerd•4h ago
I've dealt with Indian companies for security sales and I'd say the newer generation of companies like Razorpay (YC W15) are decent at SecOps, but the older and more established companies suck at it and will continue to suck at it until there is a tangible regulatory incentive to enhance security postures.

It also appears to be a side effect of compensation - why would mid-career security professional want to earn ₹15 LPA TC working for a legacy corporation if they have the skills to land at a security MNC that can afford to pay ₹35-50 LPA in TC.

Ofc, it's us foreign investors who are able to afford those higher TCs ;) - especially if we can convert someone who was mid-career in the US but had to return to India due to family or visa issues.

It reminds me of how the Israeli security scene was 10-15 years ago, with similar problems around compensation and brain drain to MNC offices.

connectsnk•5h ago
Are there any open source tools that scans the code and detects such gaffes
UltraMagnus•23m ago
Not open source, but I have used this before, and they have a very generous free tier: https://www.gitguardian.com/monitor-internal-repositories-fo...

You install their Github app and give them access to your Github repo (private repos are ok too) and they run a Github workflow when each PR is submitted scanning for secrets that should not be in the code. Really happy with how their product works.

unsungNovelty•20m ago
If you weren't aware of it... There is a world of static application security tools (SAST) which can help you. Add them to your text editor/ci/cd to use them.

https://owasp.org/www-community/Source_Code_Analysis_Tools

driverdan•3h ago
I'm curious, why wait so long to publish this? The incident was in 2023.

Show HN: Strange Attractors

https://blog.shashanktomar.com/posts/strange-attractors
203•shashanktomar•4h ago•24 comments

S.A.R.C.A.S.M: Slightly Annoying Rubik's Cube Automatic Solving Machine

https://github.com/vindar/SARCASM
73•chris_overseas•4h ago•11 comments

Futurelock: A subtle risk in async Rust

https://rfd.shared.oxide.computer/rfd/0609
271•bcantrill•10h ago•117 comments

Introducing architecture variants

https://discourse.ubuntu.com/t/introducing-architecture-variants-amd64v3-now-available-in-ubuntu-...
178•jnsgruk•1d ago•113 comments

Viagrid – PCB template for rapid PCB prototyping with factory-made vias [video]

https://www.youtube.com/watch?v=A_IUIyyqw0M
75•surprisetalk•4d ago•24 comments

Addiction Markets

https://www.thebignewsletter.com/p/addiction-markets-abolish-corporate
199•toomuchtodo•9h ago•183 comments

My Impressions of the MacBook Pro M4

https://michael.stapelberg.ch/posts/2025-10-31-macbook-pro-m4-impressions/
133•secure•17h ago•189 comments

A theoretical way to circumvent Android developer verification

https://enaix.github.io/2025/10/30/developer-verification.html
102•sleirsgoevy•7h ago•68 comments

Use DuckDB-WASM to query TB of data in browser

https://lil.law.harvard.edu/blog/2025/10/24/rethinking-data-discovery-for-libraries-and-digital-h...
148•mlissner•10h ago•39 comments

Fungus: The Befunge CPU(2015)

https://www.bedroomlan.org/hardware/fungus/
7•onestay42•2h ago•1 comments

Hacking India's largest automaker: Tata Motors

https://eaton-works.com/2025/10/28/tata-motors-hack/
147•EatonZ•3d ago•50 comments

Active listening: the Swiss Army Knife of communication

https://togetherlondon.com/insights/active-listening-swiss-army-knife
27•lucidplot•4d ago•14 comments

Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking

https://arstechnica.com/gadgets/2025/10/leaker-reveals-which-pixels-are-vulnerable-to-cellebrite-...
213•akyuu•1d ago•123 comments

Perfetto: Swiss army knife for Linux client tracing

https://lalitm.com/perfetto-swiss-army-knife/
105•todsacerdoti•15h ago•10 comments

How We Found 7 TiB of Memory Just Sitting Around

https://render.com/blog/how-we-found-7-tib-of-memory-just-sitting-around
114•anurag•1d ago•25 comments

Why Should I Care What Color the Bikeshed Is?

https://www.bikeshed.com/
6•program•1w ago•3 comments

Signs of introspection in large language models

https://www.anthropic.com/research/introspection
112•themgt•1d ago•56 comments

Kerkship St. Jozef, Antwerp – WWII German Concrete Tanker

https://thecretefleet.com/blog/f/kerkship-st-jozef-antwerp-%E2%80%93-wwii-german-concrete-tanker
10•surprisetalk•1w ago•1 comments

Nix Derivation Madness

https://fzakaria.com/2025/10/29/nix-derivation-madness
155•birdculture•13h ago•57 comments

Photographing the rare brown hyena stalking a diamond mining ghost town

https://www.bbc.com/future/article/20251014-the-rare-hyena-stalking-a-diamond-mining-ghost-town
14•1659447091•4h ago•1 comments

Show HN: Pipelex – Declarative language for repeatable AI workflows

https://github.com/Pipelex/pipelex
80•lchoquel•3d ago•15 comments

Llamafile Returns

https://blog.mozilla.ai/llamafile-returns/
97•aittalam•2d ago•18 comments

Sustainable memristors from shiitake mycelium for high-frequency bioelectronics

https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0328965
109•PaulHoule•14h ago•55 comments

AI scrapers request commented scripts

https://cryptography.dog/blog/AI-scrapers-request-commented-scripts/
192•ColinWright•11h ago•142 comments

The cryptography behind electronic passports

https://blog.trailofbits.com/2025/10/31/the-cryptography-behind-electronic-passports/
140•tatersolid•16h ago•89 comments

Pangolin (YC S25) is hiring a full stack software engineer (open-source)

https://docs.pangolin.net/careers/software-engineer-full-stack
1•miloschwartz•10h ago

Apple reports fourth quarter results

https://www.apple.com/newsroom/2025/10/apple-reports-fourth-quarter-results/
136•mfiguiere•1d ago•190 comments

Lording it, over: A new history of the modern British aristocracy

https://newcriterion.com/article/lording-it-over/
49•smushy•6d ago•102 comments

The 1924 New Mexico regional banking panic

https://nodumbideas.com/p/labor-day-special-the-1924-new-mexico
48•nodumbideas•1w ago•1 comments

Attention lapses due to sleep deprivation due to flushing fluid from brain

https://news.mit.edu/2025/your-brain-without-sleep-1029
525•gmays•14h ago•254 comments