Tuesday, April 8, 2025
Homecyber securityVolvo Cars Servers Hacked - Attackers stolen Research and Development Information

Volvo Cars Servers Hacked – Attackers stolen Research and Development Information

Published on

SIEM as a Service

Follow Us on Google News

The Swedish carmaker Volvo Cars has recently declared that some of their servers were hacked by unknown threat actors, and in this data breach, the attackers have stolen crucial data regarding the R&D (Research and development information).

However, Volvo Cars acted immediately and promptly after detecting the unauthorized access and data breach. As a result, Volvo Cars implemented all the necessary security countermeasures in which they notified pertinent authorities along with their respective departments and prohibited all further access to its database.

Here’s the notice of cyber security breach published by Volvo:-

“Investigations so far confirm that a limited amount of the company’s R&D property has been stolen during the intrusion. Volvo Cars have earlier today concluded, based on information available, that there may be an impact on the company’s operation.”

- Advertisement - Google News

“After detecting the unauthorized access, the company immediately implemented security countermeasures including steps to prevent further access to its property and notified relevant authorities.”

Snatch Ransomware Claimed this Attack

Till now the Volvo cars have not yet disclosed any key details regarding this hack, but, one of the renowned ransomware groups, Snatch ransomware has already claimed that this attack is executed by them.

On November 30, 2021, the Snatch ransomware gang breached Volvo Car Corporation’s servers in which they have stolen all the essential data of Volvo cars, and they presented screenshots of the stolen files as proof.

During the intrusion, the threat actors have leaked 35.9 MB of the data that they have stolen from the severs of Volvo cars.

Here’s what Volvo stated:-

“Volvo Cars does not comment on speculation about potential cyber security attacks but takes all potential threats to its cyber security and thefts of its property seriously.”

But, as an assurance, the security authorities of Volvo cars have asserted that they are closely working with several third-party security experts to know the exact reason and close the loopholes. 

Not only that even, they have also claimed that the safety or security of its cars or personal data will not be affected by this breach.

Apart from this, several vehicle manufacturers assume that for hackers this current trend of autonomous cars will unlock the door. So, in this case, to block hackers from exploring any backdoor, the companies need to make their security mechanisms and systems robust and updated.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Microsoft April 2025 Patch Tuesday: Fixing 121 Vulnerabilities, Including a Critical Zero-Day

Microsoft has rolled out its April 2025 Patch Tuesday update, addressing 121 security vulnerabilities...

Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet

In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit...

Shopware Security Plugin Vulnerability Enables SQL Injection Attacks

A recently disclosed SQL injection vulnerability in older versions of the Shopware platform has...

Attackers Exploit SourceForge Platform to Distribute Malware

A recent malware distribution scheme has been uncovered on SourceForge, the popular software hosting...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft April 2025 Patch Tuesday: Fixing 121 Vulnerabilities, Including a Critical Zero-Day

Microsoft has rolled out its April 2025 Patch Tuesday update, addressing 121 security vulnerabilities...

Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet

In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit...

Shopware Security Plugin Vulnerability Enables SQL Injection Attacks

A recently disclosed SQL injection vulnerability in older versions of the Shopware platform has...