Volkswagen Hacked, Critical Data Stolen

One of the world’s leading automotive manufacturers, Volkswagen has fallen victim to a sophisticated hackers who penetrated Volkswagen Group’s IT systems, stealing over 19k documents undetected for an extended period - likely to be for longer than five years.   

According to reports from Germa  broadcaster ZDF, malicious actors repeatedly infiltrated Volkswagen’s systems and patiently exfiltrating Pntellectual Property over the period between 2010 and 2015.

Volkswagen Group is one of the world’s largest automakers, with last year’s revenue exceeding $322 billion and employees over 667,000. The group’s brands include Audi, Lamborghini, MAN, Porsche, Skoda, Bentley, and others. The attackers  focused on the company’s development of gasoline engines, transmission development, and dual-clutch transmission research. Additionally, attackers focused a lot of effort on Volkswagen’s electric vehicle (EV) research. 

According to sources, at least 19,000 documents were stolen from the can manufacturer, although Volkswagen's security team did manage to recover some of the files.The nature of the stolen data stolen in the Volkswagen cyberattack indicates that the hackers were not simply opportunistic. Rather, they had a specific focus on acquiring high-value technological information. 

Detailed research the exfiltrated files shows that the main target were Volkswagen’s proprietary EV technologies and production processe This might turn out to be a significant threat to Volkswagen’s competitive advantage in the growing worldwide EV market.

It is understood that the  attackers’ IP addresses, the software they used and the time zone they operate all point to the hack originating from China. 

In response to the breach, Volkswagen  initiated a comprehensive security overhaul. The company works closely with cybersecurity experts and international law enforcement agencies to track the perpetrators and prevent further leaks of sensitive information. 

Volkswagen has assured its customers and other stakeholders that immediate steps are being taken to enhance security measures and safeguard against future attacks.

ZDF     |      Cybernews   |   Cubic Lighthouse    |     GBHackers    |   Cybersecuritynews     |    SecureBlink     | 

Image: Unsplash

You Might Also Read: 

Toyota Shut Down Japanese Plants In A Supply Chain Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Defending Space Assets From Emerging Threats
Germany Threatens Russia With 'Consequences' For 2023 Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CyberDefenses

CyberDefenses

CyberDefenses services combine best-in-class cybersecurity oversight, managed services and training to help our clients truly address their cybersecurity challenges.

Softtek

Softtek

Softtek provides comprehensive software Quality Assurance and Testing that identifies the correctness, completeness, and quality level of software products.

Academic Centres of Excellence in Cyber Security Research

Academic Centres of Excellence in Cyber Security Research

The ACE-CSRs scheme is part of the UK Government’s National Cyber Security Strategy, working with academia and industry to make the UK more resilient to cyber attacks.

GlassSquid

GlassSquid

glasssquid.io simplifies your cyber security job search. We want to help you find your next perfect fit opportunity by removing the confusion.

ActiveNav

ActiveNav

ActiveNav provide dark data discovery solutions for compliance and information governance.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

GlassHouse Technology

GlassHouse Technology

GlassHouse supports customers in their digitalization journey with our deep technical expertise in Managed Cloud and Security Services, SAP Infrastructure Service and Business Continuity Services.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.