Company Details
carmax
17,416
165,872
43
carmax.com
0
CAR_2493360
In-progress


CarMax Vendor Cyber Rating & Cyber Score
carmax.comWe're fueled by a common goal: creating an iconic car-buying experience. We make car-buying fair, accessible, and joyful for all. We are committed to making progress in how we positively impact our society, now and in the future. Above all, we care about people. We are committed to putting people first, including our associates, customers, and communities. Spark positive change alongside us. Here’s your chance to leave a mark. Find the purpose, tools, and resources to go for greatness with teammates by your side. We offer benefits and resources to help make your best life happen. Professional growth and limitless opportunities await. There's no better place to be.
Company Details
carmax
17,416
165,872
43
carmax.com
0
CAR_2493360
In-progress
Between 650 and 699

CarMax Global Score (TPRM)XXXX

Description: ShinyHunters Claims Data Breaches at Panera Bread, CarMax, Edmunds, and More The extortion group ShinyHunters has alleged large-scale data theft from multiple organizations, including Panera Bread, CarMax, and Edmunds, as part of a broader campaign targeting corporate credentials. According to claims reviewed by *The Register* and shared on the dark web, the group exfiltrated over 14 million records from Panera Bread including names, email addresses, phone numbers, and account details totaling 760 MB of compressed data. CarMax and Edmunds were also reportedly breached, with 500,000+ records (1.7 GB) and "millions" of records (12 GB), respectively, containing similar personally identifiable information (PII). ShinyHunters stated it accessed Panera’s systems via a Microsoft Entra single-sign-on (SSO) code, while the CarMax and Edmunds breaches stemmed from earlier, unrelated intrusions. The group’s claims align with previous activity by Scattered Lapsus$ Hunters, a linked threat actor that posted CarMax data on a now-defunct leak site last fall, citing compromises in Salesforce environments. The campaign extends beyond these three companies. Last week, ShinyHunters added Crunchbase, SoundCloud, and Betterment to its list of victims, claiming over 50 million records stolen in total. Access to Crunchbase and Betterment was reportedly gained through voice-phishing attacks targeting Okta SSO credentials, a tactic Okta warned about in recent advisories. Betterment confirmed an unauthorized intrusion on January 9, where attackers used social engineering to access third-party marketing platforms and send fraudulent crypto-related messages to customers. Security researchers have observed the group’s expanding operations. Silent Push reported that ShinyHunters’ latest credential-stealing campaign targeted around 100 organizations in the past 30 days, though it remains unconfirmed how many attacks succeeded. Meanwhile, Mandiant is tracking a "new, ongoing ShinyHunters-branded campaign" leveraging voice-phishing to harvest SSO credentials. None of the named companies Panera Bread, CarMax, Edmunds, Crunchbase, or Betterment have publicly responded to the claims. Microsoft and Google stated they had no indication their products were directly affected by the phishing campaign. The incidents underscore the growing threat of social engineering attacks bypassing multi-factor authentication (MFA) to compromise corporate systems.
Description: ShinyHunters Expands Vishing Campaign Targeting High-Value Organizations with Advanced Phishing Kits Okta researchers have uncovered a surge in voice-based social engineering attacks linked to the notorious extortion group ShinyHunters (also tracked as UNC6040), which has targeted over 100 high-value organizations in the past month. The group’s latest campaign leverages real-time phishing kits and hybrid vishing techniques to bypass multi-factor authentication (MFA) and steal credentials, session tokens, and sensitive data. ### How the Attack Works ShinyHunters employs "Live Phishing Panels" automated tools that enable man-in-the-middle (MitM) attacks on login sessions. Attackers impersonate IT support, guiding victims through fake MFA prompts while dynamically adjusting phishing pages to match legitimate authentication flows. For example: - If a victim receives a push notification, the attacker instructs them to expect it, then manipulates the phishing site to display a fake confirmation. - If the MFA method requires a one-time code, the attacker either provides the correct number (obtained in real time from the legitimate site) or modifies the phishing page to display it. This approach defeats even push-based MFA, which was designed to counter automated phishing attacks. ### Recent Data Breaches Linked to ShinyHunters The group has claimed responsibility for data leaks from multiple companies, including: - Dating apps: Hinge, Match, OkCupid, and Bumble (though Match Group stated no financial or login data was compromised). - Other victims: SoundCloud, CrunchBase, Betterment, CarMax, Edmunds.com, and Panera Bread. While the exact breach methods remain unconfirmed, researchers note the attacks align with ShinyHunters’ known tactics, including: - Credential theft via phishing kits. - Session token hijacking for SSO platforms like Okta. - Data exfiltration from SaaS applications. ### Broader Impact & Response Okta’s advisory highlights a rise in similar attacks targeting Okta, Microsoft, and Google accounts, driven by commercial phishing kits optimized for voice-based social engineering. Cybersecurity firm Hudson Rock confirmed the leaked data matches ShinyHunters’ previous claims, reinforcing the group’s credibility. Companies are advised to: - Verify IT support calls through official channels. - Audit OSS provider logs for suspicious device enrollments or new IP logins. ShinyHunters, active since 2020, has a history of breaching major brands, often through employee account compromise. The latest campaign suggests an expansion of targets, with potential for further data leaks.


CarMax has 50.0% fewer incidents than the average of same-industry companies with at least one recorded incident.
CarMax has 13.79% fewer incidents than the average of all companies with at least one recorded incident.
CarMax reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
CarMax cyber incidents detection timeline including parent company and subsidiaries

We're fueled by a common goal: creating an iconic car-buying experience. We make car-buying fair, accessible, and joyful for all. We are committed to making progress in how we positively impact our society, now and in the future. Above all, we care about people. We are committed to putting people first, including our associates, customers, and communities. Spark positive change alongside us. Here’s your chance to leave a mark. Find the purpose, tools, and resources to go for greatness with teammates by your side. We offer benefits and resources to help make your best life happen. Professional growth and limitless opportunities await. There's no better place to be.


Menards home improvement stores are conveniently located throughout the Midwest in a 14-state region. From the novice do-it-yourselfer to the experienced contractor, Menards has something for everyone! As a family-owned and operated business, Menards is truly dedicated to service and quality and is

At Costa Coffee, we’ve been crafting with heart and changing the coffee game since 1971. Now part of The Coca-Cola Company, we proudly operate in over 50 countries, and we’re still growing! And we’re much more than our beloved stores. Consumers all over the world can now enjoy Costa Coffee in our Re

At Academy Sports + Outdoors, we believe in the power of fun. And we believe in helping our customers have more of it. With a wide assortment of sporting and outdoors gear, Academy offers the best brands under one roof — curated to make the most of every budget. Day in and day out, our 20,000+ Team

Genesco is a footwear focused specialty retailer and branded company with more than 1,400 stores in the U.S., Canada, the U.K. and Republic of Ireland. We also sell footwear at wholesale under the Johnston & Murphy brand, and through licensing agreements under the Levi’s, Dockers, Bass and other foo

MC is a company from the SONAE group, and is a leader in the food retail industry in Portugal. We are a company made by all, to all. With a history of over 35 years of continuous growth, MC has a distinctive positioning in different business areas, with a vast portfolio of high quality products, se

Proudly serving our customers in the Chicagoland area since 1899, Jewel-Osco provides friendly service, quality products and great value. Jewel-Osco operates 188 stores throughout the Chicagoland area, Indiana and Iowa, which is part of a 2,200+ store operation that employs approximately 290,000 peo

Hallmark believes if you care enough you can change the world as we work to help create a more emotionally connected world in every life, every day. Founded in 1910 by a teenage entrepreneur with two shoe boxes of postcards under his arm, Hallmark today is still family owned and privately held.
Woolworths Group is one of Australia and New Zealand’s leading retail groups, supporting well-known brands such as Woolworths, Big W and Countdown. Our great team is focused on creating better experiences together, for our customers, our communities, and for each other. People are at the heart of e

Safeway operates as a banner of Albertsons Companies. Locally great and nationally strong, Albertsons Cos. (NYSE: ACI) is one of the largest food and drug retailers in the United States. Albertsons Cos. operates stores across 34 states and the District of Columbia under 20 well-known banners includi
.png)
Micron forecast fiscal second-quarter revenue higher than expectations, BlackBerry issues disappointing guidance, and JFrog shares are...
CarGurus Inc. was hit with a flurry of lawsuits over a February data breach that allegedly exposed the data of around 12.5 million people.
Dealerships and auto retail companies face a new cybersecurity threat after a hacking group exposed more than 1.7 million CarGurus corporate...
Match Group Inc. and CarMax Auto Superstores Inc. were hit with separate lawsuits arising from a series of late-January data breaches that...
Hacking group ShinyHunters has claimed to have pilfered over 14 million records from U.S. multinational bakery-cafe chain Panera Bread,...
The Scattered LAPSUS$ Hunters threat collective has launched a new dark web data leak site to attempt to extort victims of the group's breaches of Salesloft...
Shamim Mohammad, EVP and Chief Information and Technology Officer, shares how AI is helping reimagine customer experiences, streamline operations, and...
Explore tech job opportunities in Richmond, VA in 2025 with this guide. Discover top employers, job growth projections, and resources.
The top tech companies to work for in 2025 include Capital One, PwC, CoStar Group, Red Hat, CarMax, Mission Lane, Indivior, Aura Management, Tactiq, and Hatch.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CarMax is http://carmax.com.
According to Rankiteo, CarMax’s AI-generated cybersecurity score is 657, reflecting their Weak security posture.
According to Rankiteo, CarMax currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CarMax has been affected by a supply chain cyber incident involving Microsoft Entra Community, with the incident ID PANEDMCAR1769547392.
According to Rankiteo, CarMax is not certified under SOC 2 Type 1.
According to Rankiteo, CarMax does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CarMax is not listed as GDPR compliant.
According to Rankiteo, CarMax does not currently maintain PCI DSS compliance.
According to Rankiteo, CarMax is not compliant with HIPAA regulations.
According to Rankiteo,CarMax is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CarMax operates primarily in the Retail industry.
CarMax employs approximately 17,416 people worldwide.
CarMax presently has no subsidiaries across any sectors.
CarMax’s official LinkedIn profile has approximately 165,872 followers.
CarMax is classified under the NAICS code 43, which corresponds to Retail Trade.
No, CarMax does not have a profile on Crunchbase.
Yes, CarMax maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/carmax.
As of April 02, 2026, Rankiteo reports that CarMax has experienced 2 cybersecurity incidents.
CarMax has an estimated 15,730 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with okta researchers, hudson rock, and remediation measures with audit oss provider logs for suspicious device enrollments or new ip logins, and communication strategy with advisories to verify it support calls through official channels..
Title: ShinyHunters Claims Data Breaches at Panera Bread, CarMax, Edmunds, and More
Description: The extortion group ShinyHunters has alleged large-scale data theft from multiple organizations, including Panera Bread, CarMax, and Edmunds, as part of a broader campaign targeting corporate credentials. The group exfiltrated over 14 million records from Panera Bread, 500,000+ records from CarMax, and millions of records from Edmunds, containing personally identifiable information (PII). The breaches were reportedly achieved via Microsoft Entra SSO code exploitation, earlier intrusions, and voice-phishing attacks targeting Okta SSO credentials.
Type: Data Breach
Attack Vector: Phishing (Voice-Phishing)Exploitation of SSO VulnerabilitiesSocial Engineering
Vulnerability Exploited: Microsoft Entra SSO CodeOkta SSO CredentialsSalesforce Environments
Threat Actor: ShinyHunters (linked to Scattered Lapsus$ Hunters)
Motivation: Extortion, Data Theft for Sale on Dark Web
Title: ShinyHunters Expands Vishing Campaign Targeting High-Value Organizations with Advanced Phishing Kits
Description: Okta researchers uncovered a surge in voice-based social engineering attacks linked to the extortion group ShinyHunters (UNC6040), targeting over 100 high-value organizations. The campaign uses real-time phishing kits and hybrid vishing techniques to bypass MFA, steal credentials, session tokens, and sensitive data. The group employs 'Live Phishing Panels' for man-in-the-middle attacks, dynamically adjusting phishing pages to mimic legitimate authentication flows, defeating even push-based MFA.
Type: Phishing/Vishing, Credential Theft, Data Breach, Session Hijacking
Attack Vector: Voice-based social engineering, Man-in-the-Middle (MitM) phishing, Fake MFA prompts
Vulnerability Exploited: Multi-Factor Authentication (MFA) bypass, Session token hijacking, Credential theft via phishing kits
Threat Actor: ShinyHunters (UNC6040)
Motivation: Extortion, Data theft, Financial gain, Credential harvesting
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Microsoft Entra SSO CodeOkta SSO CredentialsVoice-Phishing and Employee account compromise via phishing/vishing.

Data Compromised: Personally Identifiable Information (PII), Account Details, Customer Records
Systems Affected: Microsoft Entra SSOOkta SSOSalesforce EnvironmentsThird-Party Marketing Platforms
Operational Impact: Unauthorized Access to Corporate Systems, Fraudulent Customer Communications
Brand Reputation Impact: Potential Damage Due to Data Exposure and Fraudulent Activities
Identity Theft Risk: High (Exposure of Names, Email Addresses, Phone Numbers, Account Details)

Data Compromised: Credentials, Session tokens, Sensitive data, Personally identifiable information (PII)
Systems Affected: Single Sign-On (SSO) platforms (Okta, Microsoft, Google), SaaS applications
Operational Impact: Compromised employee accounts, Unauthorized access to corporate systems
Brand Reputation Impact: Potential reputational damage due to data leaks
Identity Theft Risk: High (PII exposure)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Email Addresses, Phone Numbers, Account Details, , Credentials, Session tokens, Personally identifiable information (PII) and Sensitive corporate data.

Entity Name: Panera Bread
Entity Type: Corporation
Industry: Food & Beverage
Customers Affected: 14 million records

Entity Name: CarMax
Entity Type: Corporation
Industry: Automotive
Customers Affected: 500,000+ records

Entity Name: Edmunds
Entity Type: Corporation
Industry: Automotive
Customers Affected: Millions of records

Entity Name: Crunchbase
Entity Type: Corporation
Industry: Technology (Business Information)

Entity Name: SoundCloud
Entity Type: Corporation
Industry: Technology (Music Streaming)

Entity Name: Betterment
Entity Type: Corporation
Industry: FinTech

Entity Name: Hinge
Entity Type: Dating app
Industry: Online Dating

Entity Name: Match
Entity Type: Dating app
Industry: Online Dating

Entity Name: OkCupid
Entity Type: Dating app
Industry: Online Dating

Entity Name: Bumble
Entity Type: Dating app
Industry: Online Dating

Entity Name: SoundCloud
Entity Type: Music streaming platform
Industry: Technology/Media

Entity Name: CrunchBase
Entity Type: Business database
Industry: Technology/Business Intelligence

Entity Name: Betterment
Entity Type: Financial services
Industry: FinTech

Entity Name: CarMax
Entity Type: Automotive retailer
Industry: Retail/Automotive

Entity Name: Edmunds.com
Entity Type: Automotive research
Industry: Retail/Automotive

Entity Name: Panera Bread
Entity Type: Restaurant chain
Industry: Food & Beverage

Entity Name: Over 100 high-value organizations
Entity Type: Various
Industry: Multiple

Third Party Assistance: Okta researchers, Hudson Rock
Remediation Measures: Audit OSS provider logs for suspicious device enrollments or new IP logins
Communication Strategy: Advisories to verify IT support calls through official channels
Third-Party Assistance: The company involves third-party assistance in incident response through Okta researchers, Hudson Rock.

Type of Data Compromised: Names, Email addresses, Phone numbers, Account details
Number of Records Exposed: 14 million (Panera Bread), 500,000+ (CarMax), Millions (Edmunds), 50+ million (Total Across All Victims)
Sensitivity of Data: High (PII, Account Credentials)

Type of Data Compromised: Credentials, Session tokens, Personally identifiable information (PII), Sensitive corporate data
Sensitivity of Data: High (PII, corporate data)
Data Exfiltration: Yes
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Audit OSS provider logs for suspicious device enrollments or new IP logins.

Data Exfiltration: True

Lessons Learned: Voice-based social engineering and real-time phishing kits can bypass advanced MFA protections. Organizations must verify IT support communications through official channels and monitor for suspicious logins.

Recommendations: Verify IT support calls through official channels, Audit OSS provider logs for suspicious device enrollments or new IP logins, Implement additional authentication layers beyond MFA, Monitor for unusual session activityVerify IT support calls through official channels, Audit OSS provider logs for suspicious device enrollments or new IP logins, Implement additional authentication layers beyond MFA, Monitor for unusual session activityVerify IT support calls through official channels, Audit OSS provider logs for suspicious device enrollments or new IP logins, Implement additional authentication layers beyond MFA, Monitor for unusual session activityVerify IT support calls through official channels, Audit OSS provider logs for suspicious device enrollments or new IP logins, Implement additional authentication layers beyond MFA, Monitor for unusual session activity
Key Lessons Learned: The key lessons learned from past incidents are Voice-based social engineering and real-time phishing kits can bypass advanced MFA protections. Organizations must verify IT support communications through official channels and monitor for suspicious logins.

Source: The Register

Source: Silent Push

Source: Mandiant

Source: Okta Advisories

Source: Okta Research

Source: Hudson Rock
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The Register, and Source: Silent Push, and Source: Mandiant, and Source: Okta Advisories, and Source: Okta Research, and Source: Hudson Rock.

Investigation Status: Ongoing

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Advisories to verify IT support calls through official channels.

Stakeholder Advisories: Companies advised to verify IT support calls and audit logs for suspicious activity.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Companies advised to verify IT support calls and audit logs for suspicious activity..

Entry Point: Microsoft Entra Sso Code, Okta Sso Credentials, Voice-Phishing,

Entry Point: Employee account compromise via phishing/vishing
High Value Targets: SSO platforms (Okta, Microsoft, Google), SaaS applications
Data Sold on Dark Web: SSO platforms (Okta, Microsoft, Google), SaaS applications

Root Causes: Exploitation Of Sso Vulnerabilities, Social Engineering (Voice-Phishing), Compromised Third-Party Platforms,

Root Causes: Lack of employee awareness of vishing attacks, MFA bypass techniques, Real-time phishing kits
Corrective Actions: Enhanced employee training, Stricter authentication protocols, Continuous monitoring of SSO platforms
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Okta researchers, Hudson Rock.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced employee training, Stricter authentication protocols, Continuous monitoring of SSO platforms.
Last Attacking Group: The attacking group in the last incident were an ShinyHunters (linked to Scattered Lapsus$ Hunters) and ShinyHunters (UNC6040).
Most Significant Data Compromised: The most significant data compromised in an incident were Personally Identifiable Information (PII), Account Details, Customer Records, Credentials, Session tokens, Sensitive data and Personally identifiable information (PII).
Most Significant System Affected: The most significant system affected in an incident was Microsoft Entra SSOOkta SSOSalesforce EnvironmentsThird-Party Marketing Platforms and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Okta researchers, Hudson Rock.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Credentials, Session tokens, Sensitive data, Personally identifiable information (PII), Personally Identifiable Information (PII), Account Details and Customer Records.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 14.5M.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Voice-based social engineering and real-time phishing kits can bypass advanced MFA protections. Organizations must verify IT support communications through official channels and monitor for suspicious logins.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Verify IT support calls through official channels, Monitor for unusual session activity, Audit OSS provider logs for suspicious device enrollments or new IP logins and Implement additional authentication layers beyond MFA.
Most Recent Source: The most recent source of information about an incident are Mandiant, Okta Research, Silent Push, Hudson Rock, Okta Advisories and The Register.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Companies advised to verify IT support calls and audit logs for suspicious activity., .
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Employee account compromise via phishing/vishing.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Exploitation of SSO VulnerabilitiesSocial Engineering (Voice-Phishing)Compromised Third-Party Platforms, Lack of employee awareness of vishing attacks, MFA bypass techniques, Real-time phishing kits.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Enhanced employee training, Stricter authentication protocols, Continuous monitoring of SSO platforms.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.