Friday, January 10, 2025
Homecyber securityVolvo Cars Servers Hacked - Attackers stolen Research and Development Information

Volvo Cars Servers Hacked – Attackers stolen Research and Development Information

Published on

The Swedish carmaker Volvo Cars has recently declared that some of their servers were hacked by unknown threat actors, and in this data breach, the attackers have stolen crucial data regarding the R&D (Research and development information).

However, Volvo Cars acted immediately and promptly after detecting the unauthorized access and data breach. As a result, Volvo Cars implemented all the necessary security countermeasures in which they notified pertinent authorities along with their respective departments and prohibited all further access to its database.

Here’s the notice of cyber security breach published by Volvo:-

“Investigations so far confirm that a limited amount of the company’s R&D property has been stolen during the intrusion. Volvo Cars have earlier today concluded, based on information available, that there may be an impact on the company’s operation.”

“After detecting the unauthorized access, the company immediately implemented security countermeasures including steps to prevent further access to its property and notified relevant authorities.”

Snatch Ransomware Claimed this Attack

Till now the Volvo cars have not yet disclosed any key details regarding this hack, but, one of the renowned ransomware groups, Snatch ransomware has already claimed that this attack is executed by them.

On November 30, 2021, the Snatch ransomware gang breached Volvo Car Corporation’s servers in which they have stolen all the essential data of Volvo cars, and they presented screenshots of the stolen files as proof.

During the intrusion, the threat actors have leaked 35.9 MB of the data that they have stolen from the severs of Volvo cars.

Here’s what Volvo stated:-

“Volvo Cars does not comment on speculation about potential cyber security attacks but takes all potential threats to its cyber security and thefts of its property seriously.”

But, as an assurance, the security authorities of Volvo cars have asserted that they are closely working with several third-party security experts to know the exact reason and close the loopholes. 

Not only that even, they have also claimed that the safety or security of its cars or personal data will not be affected by this breach.

Apart from this, several vehicle manufacturers assume that for hackers this current trend of autonomous cars will unlock the door. So, in this case, to block hackers from exploring any backdoor, the companies need to make their security mechanisms and systems robust and updated.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

United Nations Aviation Agency Hacked Recruitment Data Exposed

The International Civil Aviation Organization (ICAO), a United Nations agency responsible for coordinating global...

Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace

Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has...

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks

A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

United Nations Aviation Agency Hacked Recruitment Data Exposed

The International Civil Aviation Organization (ICAO), a United Nations agency responsible for coordinating global...

Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace

Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has...

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks

A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to...