MODERATE SEVERITYVehicle

CarMax Data Breach

CarMax Used Vehicle Retailer Breach (2026): 431K Customer Records Including Home Address Exposed via Failed Extortion

U.S. used vehicle retailer with omnichannel car buying services.

Verified by ObscureIQ Intelligence

5.5Severity
431KRecords
4Fields
2026Year

ObscureIQ Breach Intelligence Scores
4.0
Breach Risk Index
5
Data Value
80
Market Recency
66
days
Since Breach

Risk Interpretation

High risk of phishing, financing fraud, dealership impersonation, and vehicle-linked targeting. Purchase and financing data can also reveal valuable assets and major financial decisions.

🎯 Impact & Downstream Threats

In January 2026 a threat actor published data allegedly taken from CarMax after the company declined to pay a ransom. Approximately 431,000 records were released. Names. Phone numbers. Home addresses. Email addresses. CarMax has not made detailed public statements about the incident. Notification obligations and any regulatory response have not been documented in public sources as of early 2026.

Primary downstream threats:
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Name-based social engineering
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification

📋 Breach Intelligence

EntityCarMax
OrganizationPublic Company • USA
Breach Date2026-01-01
HIBP Added2026-02-20
Records~431K (431,400 records)
Attack VectorUnknown
Data SubjectsCustomer: Direct
Breach PathwayDirect
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityStandard
Breach ID256;255
StatusConfirmed

📝 Executive Summary

CarMax, the largest used vehicle retailer in the United States, was the target of an extortion attempt that ended with a threat actor publishing stolen customer data online after the company declined to pay a ransom. The data, released in January 2026, affected approximately 431,000 individuals. The attack vector and how the data was initially obtained have not been publicly confirmed. The exposed records included names, email addresses, phone numbers, and home addresses. This combination is particularly sensitive for CarMax customers because it can signal high-value asset ownership and recent financing activity, making affected individuals targets for phishing, dealership impersonation scams, and financing fraud. Home addresses paired with vehicle purchase history create a profile that bad actors can exploit for targeted schemes. CarMax has not made detailed public statements about the incident, and no regulatory response or formal notification filings have been documented in public sources as of early 2026. Affected individuals should be alert to unsolicited contact impersonating CarMax or affiliated lenders, and should treat any unexpected emails, calls, or physical mail referencing their vehicle or financing as potentially fraudulent.

🏢 About CarMax

CarMax is the largest used vehicle retailer in the United States, operating an omnichannel buying and selling model across hundreds of locations and a major e-commerce platform. The company is publicly traded and positions itself as a consumer-friendly alternative to traditional dealership models, offering fixed pricing, vehicle inspections, and financing across its retail and online channels.

Company | USAed vehicle retail | Automotive dealership network | USA
Public CompanyUSAcarmax.com

🗂 Why They Hold Your Data

Automotive dealership networks collect customer identity, contact details, financing records, trade-in data, purchase history, service records, and payment-adjacent information across vehicle sales workflows.

📰 Recent Developments

CarMax has continued investing in digital tools for consumers to complete vehicle purchases entirely online. The company has navigated a challenging used vehicle market with elevated prices and shifting consumer demand. Its CarMax Auto Finance arm remains a component of its customer offering.

🔍 Data Points Exposed

4 verified field types:
Email
Names
Phone numbers
Physical addresses;Email

Exposure Categories

LocationPHYS ADDR

Canonical Fields

email_address, full_name, phone_number, physical_address

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~431K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: CarMax Data Breach;car-max-2026

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of CarMax
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

VehicleEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom