Monday, April 7, 2025
HomeData BreachBMW Hacked - OceanLotus APT Hackers Group Penetrate The BMW Networks

BMW Hacked – OceanLotus APT Hackers Group Penetrate The BMW Networks

Published on

SIEM as a Service

Follow Us on Google News

A well-known APT Hackers group “OceanLotus” breach the automobile giant BMW network, and successfully installed a hacking tool called “Cobalt Strike” which help them to spy and remotely control the system.

Security experts from BMW spotted that hackers penetrate the company network system and remain stayed active since March 2019.

The OceanLotus APT group believed to be active on behalf of the State of Vietnam, and they mainly focus on the automobile industry.

- Advertisement - Google News

GBHackers previously reported various high profile malware attacks involved by the OceanLotus APT group around the globe since 2014, and the threat group targets private sectors across multiple industries, foreign governments.

Last weekend, security experts from BMW take down the hacked computers and blocked the path that was used by hackers to penetrate the network.

According to Bayerischer Rundfunk’s reports. ” The automobile company from Munich finally took the computers concerned off the grid. , the group’s IT security experts had been monitoring the hackers for months. This is the result of research by the Bayerischer Rundfunk. Also on the South Korean car manufacturer Hyundai, the hackers had it apart.

An anonymous source reported this incident to BR and states that the hackers didn’t access any sensitive information during the attack period.

BMW refused to comment further about the security incidents, but in general, they said: “We have implemented structures and processes that minimize the risk of unauthorized external access to our systems and allow us to quickly detect, reconstruct, and recover in the event of an incident.”

Based on the expert source report OceanLotus hackers also targeted the Hyundai network, and they left several requests unanswered also there is no specific technical details revealed about the incident.

Andreas Rohr of the IT security firm Deutsche Cybersecurity organization (DCSO) said “If hackers have penetrated a corporate network , they usually try to look around as inconspicuously as possible. Once a company has discovered the attackers, it’s important to find out how far hackers have spread. They are watched for this, sometimes for months. “Typically, you benefit from having discovered someone to see where further compromises exist,” 

Experts believe that the same groups may have been involved with previous automobile security breaches such as Toyota hack, in which cybercriminals accessed the server and they may have been leaked 3.1 million customer personal data online.

Also Read:

Adobe Hacked – Hackers Exploit The Bug in Magento Marketplace & Gained Access To The Users Data

OnePlus Hacked – Customers’ Personal Information Accessed by Hackers

T-Mobile Hacked – Hackers Gained Access to Prepaid Customers Data

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

20-Year-Old Scattered Spider Hacker Pleads Guilty in Major Ransomware Case

A 20-year-old Noah Urban, a resident of Palm Coast, Florida, pleaded guilty to a...

State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers

The State Bar of Texas has confirmed a data breach following the detection of...

Oracle Confirms The Data Breach- Starts Initiating Client Notifications

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking...