Volkswagen Hacked, Critical Data Stolen

One of the world’s leading automotive manufacturers, Volkswagen has fallen victim to a sophisticated hackers who penetrated Volkswagen Group’s IT systems, stealing over 19k documents undetected for an extended period - likely to be for longer than five years.   

According to reports from Germa  broadcaster ZDF, malicious actors repeatedly infiltrated Volkswagen’s systems and patiently exfiltrating Pntellectual Property over the period between 2010 and 2015.

Volkswagen Group is one of the world’s largest automakers, with last year’s revenue exceeding $322 billion and employees over 667,000. The group’s brands include Audi, Lamborghini, MAN, Porsche, Skoda, Bentley, and others. The attackers  focused on the company’s development of gasoline engines, transmission development, and dual-clutch transmission research. Additionally, attackers focused a lot of effort on Volkswagen’s electric vehicle (EV) research. 

According to sources, at least 19,000 documents were stolen from the can manufacturer, although Volkswagen's security team did manage to recover some of the files.The nature of the stolen data stolen in the Volkswagen cyberattack indicates that the hackers were not simply opportunistic. Rather, they had a specific focus on acquiring high-value technological information. 

Detailed research the exfiltrated files shows that the main target were Volkswagen’s proprietary EV technologies and production processe This might turn out to be a significant threat to Volkswagen’s competitive advantage in the growing worldwide EV market.

It is understood that the  attackers’ IP addresses, the software they used and the time zone they operate all point to the hack originating from China. 

In response to the breach, Volkswagen  initiated a comprehensive security overhaul. The company works closely with cybersecurity experts and international law enforcement agencies to track the perpetrators and prevent further leaks of sensitive information. 

Volkswagen has assured its customers and other stakeholders that immediate steps are being taken to enhance security measures and safeguard against future attacks.

ZDF     |      Cybernews   |   Cubic Lighthouse    |     GBHackers    |   Cybersecuritynews     |    SecureBlink     | 

Image: Unsplash

You Might Also Read: 

Toyota Shut Down Japanese Plants In A Supply Chain Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Defending Space Assets From Emerging Threats
Germany Threatens Russia With 'Consequences' For 2023 Cyber Attack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

Advenica

Advenica

Advenica develops, manufactures and sells innovative cybersecurity solutions for encryption and secure information exchange.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Mantix4

Mantix4

Mantix4’s M4 Cyber Threat Hunting Platform actively defends against cyber threats.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

ABM Technology Group

ABM Technology Group

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Secher Security

Secher Security

Secher Security is a professional and secure partner with a high level of professional expertise in simplifying and optimizing complex IT infrastructures.