Cybersecurity Threats In The Automotive Industry
The automotive sector, increasingly reliant on connected technologies, faces a complex cybersecurity landscape. The Cyfirma Industry Report, focusing on the past three months of 2025, offers a detailed analysis of the external threat landscape, highlighting attack campaigns, dark web chatter, vulnerabilities, and ransomware incidents.
While the industry ranks low among targeted sectors, persistent risks from data breaches, ransomware, and emerging vulnerabilities underscore the need for robust defences as vehicles become more digitally integrated.
Advanced Persistent Threats
The automotive industry remains a low-priority target for advanced persistent threat (APT) campaigns, featuring in only 2 of 11 observed campaigns (18%) over the past 90 days, up from one in the prior period. These campaigns, active in April and May, were attributed to the Russian cybercrime syndicate FIN11 and Chinese Ministry of State Security-linked groups, possibly Stone Panda or Salt Typhoon. They targeted web applications, operating systems, routers, and network monitoring tools, focusing on Asian automotive economies. This limited activity suggests that while the sector is not a primary focus, its critical infrastructure makes it a strategic target for state-sponsored actors.
Dark Web Chatter
Underground and dark web chatter about the automotive industry is minimal, accounting for just 0.93% of total industry mentions, ranking it 14th out of 14 sectors monitored. Of 531 mentions from over 300,000 posts, data breaches (84 mentions in the last 30 days) and data leaks (75) were the most prominent, rebounding after a dip. Ransomware chatter remained steady at around 20 mentions monthly, likely targeting manufacturing and dealership systems.
A 350% surge in DDoS mentions in the last 30 days points to potential extortion or disruption campaigns, while hacktivism, tied to labour or geopolitical issues, was rare but consistent. Declining web exploit mentions suggest improved perimeter security or a shift in attacker focus.
Vulnerabilities: Injection Attacks Are a Big Concern
The automotive sector accounted for 1.08% of vulnerability mentions, ranking 13th out of 14 industries, with 29 mentions from over 10,000 reported Common Vulnerabilities and Exposures (CVEs). Injection attacks spiked to eight mentions in the previous 30 days, remaining elevated at five, posing risks to connected vehicle systems. Remote and arbitrary code execution (RCE) vulnerabilities, though low, are critical due to their potential severity in automotive environments. Memory and buffer vulnerabilities briefly rose but dropped to zero, while cross-site scripting (XSS), clickjacking, and denial-of-service (DoS) risks remained steady but minor. These trends align with the industry’s growing reliance on software-driven systems, necessitating vigilant patching and monitoring.
Ransomware: A Steady Threat
Ransomware incidents in the automotive sector totalled 39 victims over the past 90 days, a marginal 2.6% increase from 38, representing 2.58% of all ransomware victims and ranking 13th. The U.S. dominated with 46% of victims (18), followed by Canada (5) and Germany (4), while Japan, South Korea, and France reported none. Only 18 of 73 active ransomware groups targeted the industry, with Qilin (13 victims) and Akira (6) leading, and Spacebears showing the highest proportional focus (16.7%). Dealerships were the primary targets, alongside manufacturers and suppliers. A February spike preceded a dip in April, with a mild upward trend since, indicating sustained but low-level interest from cybercriminals.
Proactive Measures Needed
Despite its low ranking among targeted industries, the automotive sector’s increasing connectivity amplifies its exposure to cyber threats. The report’s findings suggest that while APT campaigns and vulnerabilities remain limited, data breaches and ransomware pose consistent risks. The surge in DDoS chatter and the presence of sophisticated actors like FIN11 and Chinese state-linked groups highlight the need for enhanced cybersecurity investments.
As vehicles integrate more IoT and cloud-based systems, automakers must prioritise AI-driven threat detection, secure software development, and compliance with standards like ISO/SAE 21434 to mitigate risks and protect critical infrastructure.
Image: Imkara Visual
You Might Also Read:
Connected Cars & Cyber Security:
If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.
- Individual £5 per month or £50 per year. Sign Up
- Multi-User, Corporate & Library Accounts Available on Request
- Inquiries: Contact Cyber Security Intelligence
Cyber Security Intelligence: Captured Organised & Accessible