Ferrari hack confirmed (March 2023)

Sicherheit (Pexels, allgemeine Nutzung)[German]Italian carmaker Ferrari has been hacked, with attackers able to access and siphon off internal data. The cybercriminals are now trying to blackmail Ferrari and threatening to publish data. Since the car manufacturer did not respond to the blackmail, some of the captured data was published on the Internet.


Advertising

The luxury car manufacturer admitted the cyber security incident in a message to its customers (see also the following tweet).

Ferrari Hack

Ferrari has admitted to this attack according to the above screenshot in the tweet. There have been a cyber incident and the attackers were able to access a limited data pool and siphon data from there. The siphoned data includes personal information such as names, addresses and email addresses. The hackers attempted to blackmail Ferrari, but the company did not respond. In this episode, 7 GBytes of stolen files were posted online on a leak site. This was uncovered by the website Red Hot Cyber  as early as March 5, 2023 – but Ferrari's confirmation came now.

According to this report, which refers to an article published by Italian newspaper Corriella Della Sera on March 3, 2023, the attack was claimed by the cyber gang called RansomEXX. The attackers were able to pull internal documents, data sheets, repair manuals and more from the Maranello-based company's servers. Ferrari said via Reuters that there was "no evidence of a hack or a ransomware attack." It also said there had been no disruption to its business or production. Currently, those responsible for IT at Ferrari are investigating how the cybercriminals obtained the data in order to be able to initiate countermeasures.

Incidentally, Ferrari has already been affected by a document leak when the Speroni company was hacked by the Everest hacker group. Speroni supplies parts for sports cars and the hack also included data from projects for Ferrari, Lamborghini and Maserati. These documents were then published by the group. (via)


Advertising


Cookies helps to fund this blog: Cookie settings
Advertising


##1

This entry was posted in Security and tagged . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *