Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

April 16, 2026

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

April 16, 2026

Automotive Ransomware Attacks Double in a Year

April 16, 2026
Facebook X (Twitter) Instagram
Thursday, April 16
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Automotive Ransomware Attacks Double in a Year
News

Automotive Ransomware Attacks Double in a Year

Team-CWDBy Team-CWDApril 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Ransomware is now the fastest growing and most disruptive cyber threat facing the automotive sector, accounting for 44% of attacks on carmakers in 2025, according to Halcyon.

The security vendor crunched data from multiple sources to compile a new report on the industry. It claimed that ransomware attacks on carmakers more than doubled in 2025.

“The surge in attacks reflects a calculated shift by cybercriminals who increasingly view the automotive industry as a lucrative target, driven by its rapid adoption of connected technology, growing reliance on cloud services, and a sprawling network of third-party suppliers that broadens criminals’ opportunities to strike,” the report noted.

It pointed to connected vehicle platforms, over-the-air (OTA) update mechanisms and cloud-based environments as having expanded the typical corporate attack surface in the sector.

Smaller suppliers with potentially poor security posture often have privileged access to OEMs’ IT systems, the report added.

Read more on ransomware in the automotive sector: Cyber-Attack Costs Carmaker JLR $258m in Q2

The report also noted that carmakers are an increasingly popular target for attack due to their low tolerance for downtime.

That was highlighted last year when Jaguar Land Rover (JLR) suffered a ransomware-related production outage that stretched to five weeks, costing the firm an estimated £108m per week in fixed costs and lost profit.

That attack was branded the most expensive in history, hitting the UK economy to the tune of £1.9bn thanks to the significant knock-on effect among smaller supply chain partners that were forced to halt their production lines.

Halcyon’s Mitigation Advice for the Sector

Halcyon urged automotive sector IT teams to get ahead of the ransomware threat by:

  • Patching perimeter and edge devices and assets, such as VPNs, RDP endpoints and ERP systems
  • Deploying phishing-resistant multi-factor authentication (MFA) with a focus on on VPNs, remote access, and privileged accounts. And auditing third-party access and removing/rotating legacy credentials
  • Hardening endpoint detection and response (EDR) tools against tampering and disabling
  • Maintaining immutable, offline backups isolated from domain-joined systems, and testing restoration regularly
  • Establishing baseline security requirements for supply chain partners, including software providers, and actively monitoring for breaches in third-party tools
  • Deploying an anti-ransomware solution that can detect tell-tale behavioral patterns and stop threats before encryption

Ransomware incidents over the past year or two have struck all parts of the value chain, from manufacturers and major suppliers to connected vehicle systems, the report said.

“Given these escalating threats, companies across the automotive supply chain should prioritize understanding their exposure, strengthening their defenses, and ensuring they are prepared to respond when an attack occurs,” Halcyon added.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDocker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
Next Article [Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk
Team-CWD
  • Website

Related Posts

News

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

April 16, 2026
News

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

April 16, 2026
News

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

April 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.