Article

After the Hertz attack, what can we do to protect our data?

After the Hertz data breach, users must act fast: enroll in identity protection, monitor for phishing, and enhance their digital security measures to stay safe.

After the Hertz attack, what can we do to protect our data?
David Bernal Raspall

David Bernal Raspall

  • April 18, 2025
  • Updated: April 18, 2025 at 5:14 PM
After the Hertz attack, what can we do to protect our data?

The recent cyberattack on Hertz and its associated brands, Thrifty and Dollar, has raised serious concerns about how vulnerable our personal information really is. With sensitive data such as names, contact details, driver’s licenses, and even credit card numbers stolen, this breach underscores the urgent need for individuals to adopt stronger digital protection habits.

Understand what was stolen

The attack, carried out by the Clop ransomware group, exploited a zero-day vulnerability in Cleo file transfer tools. As a result, personal and possibly medical or legal information tied to thousands of customers may now be in the hands of cybercriminals. While the full scope is unclear, anyone who rented a vehicle through Hertz, Thrifty or Dollar in late 2024 should assume their data might be compromised.

Take immediate protective steps

Hertz is offering two years of free identity theft protection through Kroll, a firm with a solid track record. Affected users should enroll immediately and consider placing a credit freeze on their accounts to prevent unauthorized loans or credit card applications. This can block new creditors from accessing your credit report.

Be alert to phishing and scams

With this stolen data, attackers can now launch highly targeted phishing campaigns. These may come through email, phone calls or even postal mail. Never click on links or open attachments from unknown senders, and always verify information through official channels. A small dose of skepticism can prevent significant damage.

Strengthen your digital defenses

Finally, consider updating your antivirus software and using tools like password managers and VPNs. These can add essential layers of protection and reduce the risk of further exposure in future incidents.

Latest Articles

Loading next article