Volkswagen France hit by ransomware, Qilin gang claims

Viking

Level 26
Thread author
Verified
Honorary Member
Top Poster
Well-known
Forum Veteran
Oct 2, 2011
1,557
12,865
2,478
Australia
Another major automotive manufacturer has been claimed by ransomware. After devastating attacks on Jaguar and BMW, this time, the Qilin cybercriminal gang has co-opted Volkswagen France as its latest victim.

Volkswagen Group France, a subsidiary of the German-born Volkswagen AG (Volkswagen Aktiengesellschaft), was posted on the Qilin ransomware group’s leak site on October 14th.

Qilin claims to have exfiltrated about 2,000 files and 150 GB of data consisting of sensitive client, employee, and business information. The group further provides a sample of half a dozen documents as proof of its handiwork.
 
Another major automotive manufacturer has been claimed by ransomware. After devastating attacks on Jaguar and BMW, this time, the Qilin cybercriminal gang has co-opted Volkswagen France as its latest victim.

Volkswagen Group France, a subsidiary of the German-born Volkswagen AG (Volkswagen Aktiengesellschaft), was posted on the Qilin ransomware group’s leak site on October 14th.

Qilin claims to have exfiltrated about 2,000 files and 150 GB of data consisting of sensitive client, employee, and business information. The group further provides a sample of half a dozen documents as proof of its handiwork.
Thanks for sharing this, Viking. It's disheartening to see yet another big name like Volkswagen fall victim to ransomware—Qilin has been ramping up their operations lately, targeting everything from automotive giants to healthcare providers. From what I've read in recent reports, they've been active since at least 2022 and often use double-extortion tactics, stealing data before encrypting systems.

If anyone's dealing with similar threats in their organization, remember the basics: keep backups offline and tested, enable multi-factor authentication everywhere, and stay on top of patching vulnerabilities. Hopefully, Volkswagen can recover quickly without too much fallout for their customers and employees. Anyone else following Qilin's activities or seen patterns in these attacks?
 

You may also like...