Volvo Falls Victim To Hackers

The Swedish car manufacturer Volvo says that is has suffered a  breach and that hackers have stolen an undisclosed amount of research and development data.

The company has not said whether the hack is a ransomware attack and has launched an urgent  investigation into a the breach and in a statement, Volvo disclosed there might be an impact on its operations.

The company was careful to say that, at this stage, it believes the theft has not compromised the safety or security of its customers’ personal data or of their cars. It is unclear when the attack took place, when Volvo noticed the attack, or how long it continued and Volvo has disclosed only limited information about the breach.

Volvo, majority-owned by China’s Zhejiang Geely Holding Group, said the data had been stolen from an unnamed third party, which it said had contacted Volvo about the theft. In the statement, the car maker said: "Volvo Cars has become aware that one of its file repositories has been illegally accessed by a third party... Investigations so far confirm that a limited amount of the company's R&D property has been stolen during the intrusion. Volvo Cars has earlier today concluded, based on information available, that there may be an impact on the company’s operation."

Volvo's three research and development (R&D) and design centers are located in Gothenburg, in Camarillo, California, and in Shanghai, China. The company has revealed which of these sites was affected by the attack.

External cybersecurity experts have been hired to investigate the attack, and the relevant authorities in Sweden have been notified of the incident.  

Volvo Cars:   WSJ:    Oodlaoop:    Infosecurity Magazine:     AutonewsCar Dealer:     StartUp Digital:   ZDNet

You Might Also Read: 

Connected Cars - What  Does Your Car Know About You?:

 

« Israel & Iran Locked In Cyber Conflict
Keeping Women Safe On British Streets »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Neudomains

Neudomains

Neudomains is a Corporate Domain Name Management and Brand Protection Online Specialist. One of the world's top providers of online brand protection and enforcement.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

Metmox

Metmox

Metmox mission is to be trusted advisor and partner to protect our customer’s evolving Cloud, Network, Application, IT infrastructure and cybersecurity needs.