Data BreachesJanuary 12, 20265 min read

Australian Insurer Prosura Breach Exposes Driver's Licenses

Attackers claim 98 million records from the car rental insurance provider. Stolen data includes license photos, policy documents, and personal details.

Sarah Mitchell

Australian car rental insurance provider Prosura confirmed a data breach that exposed customer personal information including photocopies of driver's licenses. Attackers have posted samples of the stolen data on a leak forum, claiming to have 98 million lines of records. The company identified the intrusion on January 3 and immediately took online services offline.

Prosura, which also operates under the Hiccup brand, sells rental car insurance in partnership with VroomVroomVroom across Australia and New Zealand. The breach affects customers who purchased policies or filed claims through these platforms.

What Was Stolen

Based on Prosura's disclosure and samples posted by attackers, the compromised data includes:

  • Full names and contact details (email, phone numbers)
  • Countries of residence and travel destinations
  • Policy details including start and end dates
  • Pricing and invoicing information
  • Driver's licenses and associated photos (for customers who filed claims)
  • Additional claim-related documentation

The combination creates significant identity theft risk. Driver's licenses serve as primary identity documents in Australia, and photocopies can enable synthetic identity fraud or social engineering attacks. Travel destination data adds context that makes phishing attempts more convincing.

Prosura emphasized that payment information wasn't compromised. The company doesn't store credit card details in its systems—a design choice that limited the breach's financial impact but didn't protect personal data.

Attackers' Aggressive Tactics

The threat actors behind the breach haven't limited themselves to data exfiltration. Prosura confirmed that some customers received fraudulent emails referencing the attack and their specific policy details, directing recipients to contact third-party email addresses.

Managing Director Mike Boyd described the approach as "aggressive tactics to apply pressure on our business, including contacting some customers directly." This direct victim contact—using information only the attackers would have—serves multiple purposes: it demonstrates the legitimacy of the threat, embarrasses the company, and potentially enables secondary scams targeting confused customers.

The attackers posted the data on a forum popular with cybercriminals, claiming 98 million "lines" of records. Cybernews researchers examined the sample data and confirmed it appears legitimate, containing actual policy documents and license images. The sheer volume suggests the attackers gained access to backup databases or archive systems, not just active customer records.

Timeline and Response

Prosura detected unauthorized access on January 3, 2026. An email to victims from someone claiming responsibility stated the actual intrusion occurred on New Year's Day. That two-day gap between initial access and detection isn't unusual—attackers often stage data for exfiltration after establishing persistence.

In response, Prosura:

  1. Took customer self-service portals offline
  2. Disabled policy purchasing, claims filing, and policy management functions
  3. Notified the Australian Cyber Security Centre (ACSC) and Office of the Australian Information Commissioner (OAIC)
  4. Engaged forensic investigators to determine breach scope
  5. Warned customers about fraudulent communications

The company stressed that existing policies remain valid. Customers with upcoming travel can use their coverage normally—the breach affected systems, not the underlying insurance agreements.

Customer Impact

Anyone who purchased car rental insurance through Prosura, Hiccup, or VroomVroomVroom partnerships should assume their personal data was compromised. Customers who filed claims face higher risk because their submissions included identity documents.

Affected individuals should:

  • Monitor for suspicious communications - Attackers have the data to craft convincing phishing emails referencing real policy details. Verify any insurance-related communications through official channels before responding.
  • Watch for identity misuse - Consider credit monitoring given the exposure of driver's licenses and personal details. Report any unexplained credit inquiries.
  • Ignore unsolicited contact - The attackers are directly contacting victims. Any email asking you to contact a third-party address or take urgent action should be treated as fraudulent.
  • Document everything - If identity theft occurs, having records of the Prosura breach may support fraud claims with financial institutions.

Why This Matters

The Prosura breach illustrates several trends in modern data theft. Attackers aren't just stealing data—they're weaponizing it immediately through direct victim contact and public posting to maximize pressure on the compromised organization. The psychological impact on customers receiving emails from their attacker compounds the breach's harm.

Insurance providers hold particularly sensitive data. Beyond basic PII, they collect identity documents, travel patterns, and claims information that reveals personal circumstances. When this data leaks, it enables not just generic identity theft but targeted social engineering based on specific life events.

For Australian organizations, the breach adds another case study to an already concerning pattern of incidents affecting financial services and insurance companies. The OAIC has increased enforcement activity around data breach handling, and organizations that fail to protect customer data or respond appropriately face regulatory consequences beyond reputational damage.

Prosura's decision to take systems offline rather than continue operating with potential ongoing compromise shows appropriate caution. But for the customers whose data is now circulating on criminal forums, that operational prudence came after the damage was done. The attackers have what they took, and no incident response can put that back.

Related Articles