Volkswagen Hacked, Critical Data Stolen

One of the world’s leading automotive manufacturers, Volkswagen has fallen victim to a sophisticated hackers who penetrated Volkswagen Group’s IT systems, stealing over 19k documents undetected for an extended period - likely to be for longer than five years.   

According to reports from Germa  broadcaster ZDF, malicious actors repeatedly infiltrated Volkswagen’s systems and patiently exfiltrating Pntellectual Property over the period between 2010 and 2015.

Volkswagen Group is one of the world’s largest automakers, with last year’s revenue exceeding $322 billion and employees over 667,000. The group’s brands include Audi, Lamborghini, MAN, Porsche, Skoda, Bentley, and others. The attackers  focused on the company’s development of gasoline engines, transmission development, and dual-clutch transmission research. Additionally, attackers focused a lot of effort on Volkswagen’s electric vehicle (EV) research. 

According to sources, at least 19,000 documents were stolen from the can manufacturer, although Volkswagen's security team did manage to recover some of the files.The nature of the stolen data stolen in the Volkswagen cyberattack indicates that the hackers were not simply opportunistic. Rather, they had a specific focus on acquiring high-value technological information. 

Detailed research the exfiltrated files shows that the main target were Volkswagen’s proprietary EV technologies and production processe This might turn out to be a significant threat to Volkswagen’s competitive advantage in the growing worldwide EV market.

It is understood that the  attackers’ IP addresses, the software they used and the time zone they operate all point to the hack originating from China. 

In response to the breach, Volkswagen  initiated a comprehensive security overhaul. The company works closely with cybersecurity experts and international law enforcement agencies to track the perpetrators and prevent further leaks of sensitive information. 

Volkswagen has assured its customers and other stakeholders that immediate steps are being taken to enhance security measures and safeguard against future attacks.

ZDF     |      Cybernews   |   Cubic Lighthouse    |     GBHackers    |   Cybersecuritynews     |    SecureBlink     | 

Image: Unsplash

You Might Also Read: 

Toyota Shut Down Japanese Plants In A Supply Chain Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Defending Space Assets From Emerging Threats
Germany Threatens Russia With 'Consequences' For 2023 Cyber Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.

Krash Consulting

Krash Consulting

Krash Consulting is a premier provider of Cyber Security solutions, offering a range of services to safeguard businesses against cyber-attacks, minimize fraud, and protect brand reputation globally.