Friday, September 13, 2024
HomeData BreachBMW Hacked - OceanLotus APT Hackers Group Penetrate The BMW Networks

BMW Hacked – OceanLotus APT Hackers Group Penetrate The BMW Networks

Published on

A well-known APT Hackers group “OceanLotus” breach the automobile giant BMW network, and successfully installed a hacking tool called “Cobalt Strike” which help them to spy and remotely control the system.

Security experts from BMW spotted that hackers penetrate the company network system and remain stayed active since March 2019.

The OceanLotus APT group believed to be active on behalf of the State of Vietnam, and they mainly focus on the automobile industry.

- Advertisement - EHA

GBHackers previously reported various high profile malware attacks involved by the OceanLotus APT group around the globe since 2014, and the threat group targets private sectors across multiple industries, foreign governments.

Last weekend, security experts from BMW take down the hacked computers and blocked the path that was used by hackers to penetrate the network.

According to Bayerischer Rundfunk’s reports. ” The automobile company from Munich finally took the computers concerned off the grid. , the group’s IT security experts had been monitoring the hackers for months. This is the result of research by the Bayerischer Rundfunk. Also on the South Korean car manufacturer Hyundai, the hackers had it apart.

An anonymous source reported this incident to BR and states that the hackers didn’t access any sensitive information during the attack period.

BMW refused to comment further about the security incidents, but in general, they said: “We have implemented structures and processes that minimize the risk of unauthorized external access to our systems and allow us to quickly detect, reconstruct, and recover in the event of an incident.”

Based on the expert source report OceanLotus hackers also targeted the Hyundai network, and they left several requests unanswered also there is no specific technical details revealed about the incident.

Andreas Rohr of the IT security firm Deutsche Cybersecurity organization (DCSO) said “If hackers have penetrated a corporate network , they usually try to look around as inconspicuously as possible. Once a company has discovered the attackers, it’s important to find out how far hackers have spread. They are watched for this, sometimes for months. “Typically, you benefit from having discovered someone to see where further compromises exist,” 

Experts believe that the same groups may have been involved with previous automobile security breaches such as Toyota hack, in which cybercriminals accessed the server and they may have been leaked 3.1 million customer personal data online.

Also Read:

Adobe Hacked – Hackers Exploit The Bug in Magento Marketplace & Gained Access To The Users Data

OnePlus Hacked – Customers’ Personal Information Accessed by Hackers

T-Mobile Hacked – Hackers Gained Access to Prepaid Customers Data

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Citrix Workspace App Vulnerable to Privilege Escalation Attacks

Citrix released a security bulletin (CTX691485) detailing two critical vulnerabilities in the Citrix Workspace...

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign...

Hackers Exploiting Apache OFBiz RCE Vulnerability in the Wild

A critical vulnerability in the Apache OFBiz framework has been actively exploited by hackers....

Docker Desktop Vulnerabilities Let Attackers Execute Remote Code

Docker has addressed critical vulnerabilities in Docker Desktop that could allow attackers to execute...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Fortinet Confirms Data Breach Following Hacker’s Claim of 440GB Data Theft

Fortinet, a leading cybersecurity firm, has confirmed a data breach involving a third-party cloud...

New Android Spyware As TV Streaming App Steals Sensitive Data From Devices

Recent research has revealed a new Android malware targeting mnemonic keys, a crucial component...

Researchers Details Attacks On Air-Gaps Computers To Steal Data

The air-gap data protection method isolates local networks from the internet to mitigate cyber...