Volkswagen Hacked, Critical Data Stolen

One of the world’s leading automotive manufacturers, Volkswagen has fallen victim to a sophisticated hackers who penetrated Volkswagen Group’s IT systems, stealing over 19k documents undetected for an extended period - likely to be for longer than five years.   

According to reports from Germa  broadcaster ZDF, malicious actors repeatedly infiltrated Volkswagen’s systems and patiently exfiltrating Pntellectual Property over the period between 2010 and 2015.

Volkswagen Group is one of the world’s largest automakers, with last year’s revenue exceeding $322 billion and employees over 667,000. The group’s brands include Audi, Lamborghini, MAN, Porsche, Skoda, Bentley, and others. The attackers  focused on the company’s development of gasoline engines, transmission development, and dual-clutch transmission research. Additionally, attackers focused a lot of effort on Volkswagen’s electric vehicle (EV) research. 

According to sources, at least 19,000 documents were stolen from the can manufacturer, although Volkswagen's security team did manage to recover some of the files.The nature of the stolen data stolen in the Volkswagen cyberattack indicates that the hackers were not simply opportunistic. Rather, they had a specific focus on acquiring high-value technological information. 

Detailed research the exfiltrated files shows that the main target were Volkswagen’s proprietary EV technologies and production processe This might turn out to be a significant threat to Volkswagen’s competitive advantage in the growing worldwide EV market.

It is understood that the  attackers’ IP addresses, the software they used and the time zone they operate all point to the hack originating from China. 

In response to the breach, Volkswagen  initiated a comprehensive security overhaul. The company works closely with cybersecurity experts and international law enforcement agencies to track the perpetrators and prevent further leaks of sensitive information. 

Volkswagen has assured its customers and other stakeholders that immediate steps are being taken to enhance security measures and safeguard against future attacks.

ZDF     |      Cybernews   |   Cubic Lighthouse    |     GBHackers    |   Cybersecuritynews     |    SecureBlink     | 

Image: Unsplash

You Might Also Read: 

Toyota Shut Down Japanese Plants In A Supply Chain Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Defending Space Assets From Emerging Threats
Germany Threatens Russia With 'Consequences' For 2023 Cyber Attack »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

Reclaim Security

Reclaim Security

Reclaim Security is your always-on force multiplier, empowering security teams to eliminate threat exposure using your existing security stack.