Monday, April 28, 2025
Homecyber securityVolvo Cars Servers Hacked - Attackers stolen Research and Development Information

Volvo Cars Servers Hacked – Attackers stolen Research and Development Information

Published on

SIEM as a Service

Follow Us on Google News

The Swedish carmaker Volvo Cars has recently declared that some of their servers were hacked by unknown threat actors, and in this data breach, the attackers have stolen crucial data regarding the R&D (Research and development information).

However, Volvo Cars acted immediately and promptly after detecting the unauthorized access and data breach. As a result, Volvo Cars implemented all the necessary security countermeasures in which they notified pertinent authorities along with their respective departments and prohibited all further access to its database.

Here’s the notice of cyber security breach published by Volvo:-

“Investigations so far confirm that a limited amount of the company’s R&D property has been stolen during the intrusion. Volvo Cars have earlier today concluded, based on information available, that there may be an impact on the company’s operation.”

- Advertisement - Google News

“After detecting the unauthorized access, the company immediately implemented security countermeasures including steps to prevent further access to its property and notified relevant authorities.”

Snatch Ransomware Claimed this Attack

Till now the Volvo cars have not yet disclosed any key details regarding this hack, but, one of the renowned ransomware groups, Snatch ransomware has already claimed that this attack is executed by them.

On November 30, 2021, the Snatch ransomware gang breached Volvo Car Corporation’s servers in which they have stolen all the essential data of Volvo cars, and they presented screenshots of the stolen files as proof.

During the intrusion, the threat actors have leaked 35.9 MB of the data that they have stolen from the severs of Volvo cars.

Here’s what Volvo stated:-

“Volvo Cars does not comment on speculation about potential cyber security attacks but takes all potential threats to its cyber security and thefts of its property seriously.”

But, as an assurance, the security authorities of Volvo cars have asserted that they are closely working with several third-party security experts to know the exact reason and close the loopholes. 

Not only that even, they have also claimed that the safety or security of its cars or personal data will not be affected by this breach.

Apart from this, several vehicle manufacturers assume that for hackers this current trend of autonomous cars will unlock the door. So, in this case, to block hackers from exploring any backdoor, the companies need to make their security mechanisms and systems robust and updated.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...