Volkswagen Hacked, Critical Data Stolen

One of the world’s leading automotive manufacturers, Volkswagen has fallen victim to a sophisticated hackers who penetrated Volkswagen Group’s IT systems, stealing over 19k documents undetected for an extended period - likely to be for longer than five years.   

According to reports from Germa  broadcaster ZDF, malicious actors repeatedly infiltrated Volkswagen’s systems and patiently exfiltrating Pntellectual Property over the period between 2010 and 2015.

Volkswagen Group is one of the world’s largest automakers, with last year’s revenue exceeding $322 billion and employees over 667,000. The group’s brands include Audi, Lamborghini, MAN, Porsche, Skoda, Bentley, and others. The attackers  focused on the company’s development of gasoline engines, transmission development, and dual-clutch transmission research. Additionally, attackers focused a lot of effort on Volkswagen’s electric vehicle (EV) research. 

According to sources, at least 19,000 documents were stolen from the can manufacturer, although Volkswagen's security team did manage to recover some of the files.The nature of the stolen data stolen in the Volkswagen cyberattack indicates that the hackers were not simply opportunistic. Rather, they had a specific focus on acquiring high-value technological information. 

Detailed research the exfiltrated files shows that the main target were Volkswagen’s proprietary EV technologies and production processe This might turn out to be a significant threat to Volkswagen’s competitive advantage in the growing worldwide EV market.

It is understood that the  attackers’ IP addresses, the software they used and the time zone they operate all point to the hack originating from China. 

In response to the breach, Volkswagen  initiated a comprehensive security overhaul. The company works closely with cybersecurity experts and international law enforcement agencies to track the perpetrators and prevent further leaks of sensitive information. 

Volkswagen has assured its customers and other stakeholders that immediate steps are being taken to enhance security measures and safeguard against future attacks.

ZDF     |      Cybernews   |   Cubic Lighthouse    |     GBHackers    |   Cybersecuritynews     |    SecureBlink     | 

Image: Unsplash

You Might Also Read: 

Toyota Shut Down Japanese Plants In A Supply Chain Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Defending Space Assets From Emerging Threats
Germany Threatens Russia With 'Consequences' For 2023 Cyber Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

VectorUSA

VectorUSA

VectorUSA is a premier technology solution provider. We design, build and maintain cybersecurity, data center, wireless and managed solutions – transforming business needs into technology solutions.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

Outseer

Outseer

Outseer is a leading technology company in the fight against payments fraud. Outseer reliably determines authentic customers from fraudulent behavior.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.

Bedrock Security

Bedrock Security

Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era.