Self Assessment

CYFIRMA INDUSTRY REPORT : AUTOMOTIVE

Published On : 2025-03-24
Share :
CYFIRMA INDUSTRY REPORT : AUTOMOTIVE

 

EXECUTIVE SUMMARY

The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven statistics of global industries, covering one sector each week for a quarter. This report focuses on the automotive industry, presenting key trends and statistics in an engaging infographic format.

INTRODUCTION

Welcome to the CYFIRMA infographic industry report, where we delve into the external threat landscape of the automotive industry over the past three months. This report provides valuable insights and data-driven statistics, delivering a concise analysis of attack campaigns, phishing telemetry, and ransomware incidents targeting the automotive industry.

We aim to present an industry-specific overview in a convenient, engaging, and informative format. Leveraging our cutting-edge platform telemetry and the expertise of our analysts, we bring you actionable intelligence to stay ahead in the cybersecurity landscape.

METHODOLOGY

CYFIRMA provides cyber threat intelligence and external threat landscape management platforms, DeCYFIR and DeTCT, which utilize artificial intelligence and machine learning to ingest and process relevant data, complemented by manual CTI research.
For the purpose of these reports, we leverage the following data from our platform. These are data processed by AI and ML automation based on both human research input and automated ingestions.

OBSERVED ATTACK CAMPAIGNS

  • Leveraging our Early Warning platform data set, we present known attack campaigns conducted by known advanced persistent threat actors, both nation-state and financially motivated.
  • Each attack campaign may target multiple organizations across various countries.
  • Campaign durations can vary from weeks to months or even years. They are sorted by the “last seen” date of activity to include the most relevant ones. Note that this may result in campaigns stacking up on later dates, affecting time-based trends.
  • Attribution to specific threat actors can be murky due to increasingly overlapping TTPs and commodity tools used. While suspected threat actors in this report are attributed with high confidence, we acknowledge the potential for inaccuracy.

UNDERGROUND & DARKWEB CHATTER

  • Using freshly developed and keywords-based tagging and processing of underground & dark web chatter logs, our DeCYFIR platform can now identify industry-based topics and multiple categories of context in which the industry is being discussed.
  • This feature is still in development and matching keywords are actively fine tuned. Some keywords which are essential for a specific industry are very common in cybercrime chatter. Typically many IT terms. We attempt a fine balance between accurate identification and removal of some keywords that trigger too many false positive detections.

METHODOLOGY

VULNERABILITIES

  • Using very similar freshly developed and keywords-based tagging and processing of underground & dark web chatter logs over reported CVE logs, our DeCYFIR platform can now identify industry and multiple categories of vulnerabilities in which the industry is being present in reported CVE.
  • This feature is still in development and matching keywords are actively fine tuned. Some keywords that are essential for specific industries are very common in vulnerability descriptions, typically many IT terms. We attempt the same fine balance between accurate identification and removal of some keywords that trigger too many false positive detections.

RANSOMWARE

  • The victim data presented in this report is directly sourced from the blogs of respective ransomware groups. However, it’s worth noting that certain blogs may provide limited victim information, such as only names or domains, while others may be entirely obfuscated. These limitations can impact the accuracy of victimology during bulk data processing.
  • In some cases, multiple companies share the same name but are located in different countries, which may lead to discrepancies in geography and industry. Similar discrepancies occur with multinational organizations where we are not able to identify which branch in which country was compromised. In such a case, we count the country of the company’s HQ.
  • During the training of our processing algorithms, we manually verified results for industry and geography statistics at an accuracy rate of 85% with a deviation of ±5%. We continuously fine-tune and update the process.
  • Data related to counts of victims per ransomware group and respective dates are 100% accurate at the time of ingestion, as per their publishing on the respective group’s blog sites.
  • Finally, we acknowledge that many victims are never listed as they are able to make a deal with the attackers to avoid being published on their blogs.

While this report contains statistics and graphs generated primarily by automation, it undergoes thorough review and enhancement for additional context by CYFIRMA CTI analysts to ensure the highest quality and provide valuable insights.

ADVANCED PERSISTENT THREAT ATTACK CAMPAIGNS

Automotive organizations did feature in 2 of the 5 observed campaigns, which is a presence in 40% of all campaigns. This is an increase from 1 in 7 campaigns and 14% presence in the previous 90-day period.

OBSERVED CAMPAIGNS PER MONTH

Observed campaigns are distributed intermittently and alternate between months.

SUSPECTED THREAT ACTORS

The observed campaigns are attributed to multiple Chinese threat actors. We observe overlapping TTP between older naming conventions (Stone Panda, MISSION2025) and new tool-based Typhoon names. We hypothesize these are most likely the same or re-organized nation-state teams.

GEOGRAPHICAL DISTRIBUTION

Victims of observed attack campaigns have been recorded in 12 different countries. Most recorded victims are in both campaigns. Between Asia, NATO, and listed QUAD alliance countries are of geopolitical interest to the Chinese government.

TOP ATTACKED TECHNOLOGY

Both the observed campaigns targeted web applications and operating systems. Furthermore, database management software, routers, network monitoring tools, and application infrastructure software were also targeted.

APT CAMPAIGNS

EXTERNAL THREAT LANDSCAPE MANAGEMENT (ETLM) OVERVIEW

Risk Level Indicator: Medium

In the past 90 days, automotive organizations have been moderately affected by advanced persistent threat (APT) campaigns. 2 in 5 observed APT campaigns targeted the automotive industry, representing a 40% presence.

This represents an increase from the previous 90-day period when 1 out of 7 campaigns targeted the automotive industry.

Monthly Trends

The observed campaigns occurred during January and March.

Key Threat Actors

The campaigns are attributed to Chinese threat actors Salt Typhoon and Volt Typhoon.

Geographical Impact

The campaigns have affected a total of 12 countries, seemingly distributed randomly across continents. However, most countries are also of interest to the Chinese Communist Party (CCP).

Targeted Technologies

Web applications and operating systems remain the most frequently targeted technology. Additionally, database management, routers, network monitoring tools, and application infrastructure software have been compromised.

UNDERGROUND & DARKWEB CHATTER ANALYSIS

Over the past three months, CYFIRMA’s telemetry has identified 443 mentions of automotive out of a total of 53,681 industry mentions. This is from a total of 502,166 posts across various underground and dark web channels and forums.

Automotive ranked as the least frequently mentioned industry in the last 90 days with a share of 0.82% of all detected industry chatter.

Below is a breakdown of 30-day periods of all mentions.

GLOBAL CHATTER CATEGORIES

Data breaches, data leaks, and ransomware were the top three categories of recorded cyber threats for the automotive industry. Notably, there was a significant increase in ransomware and web exploits in the last 30 days.

UNDERGROUND & DARKWEB

EXTERNAL THREAT LANDSCAPE MANAGEMENT (ETLM) OVERVIEW

Risk Level Indicator: Low

In total, automotive comprises 0.82% of all detected industry underground and dark web chatter in the last 90 days, ranking as the least frequently mentioned industry.
Below are the observed key trends across 90 days.

Steady Increase in Mentions (+80%)
108 (Jan) → 141 (Feb) → 194 (Mar)

Top Threats (March 2025)
Ransomware: 61 (↑578% since Jan)
Data Breach & Leak: 54 each (both ↑35%)
Web Exploit: 17 (from 0 in Jan)

Ransomware Spike
9 (Jan) → 46 (Feb) → 61 (Mar)

Web Exploits Emerging Rapidly
0 (Jan) → 1 (Feb) → 17 (Mar)

DDoS Attacks Declining
4 (Jan) → 3 (Feb) → 2 (Mar)

Hacktivism is Minimal & Inconsistent
Low mentions (3 → 1 → 3)

VULNERABILITIES ANALYSIS

Over the past three months, CYFIRMA’s telemetry has identified 43 mentions of automotive out of a total of 4,542 industry mentions. This is from a total of 10,517 CVEs published in 90 days.

The automotive industry ranked as the 2nd least frequently mentioned industry in the last 90 days with a share of 0.95% of all detected industry chatter.

Below is a breakdown of 30-day periods of all mentions.

GLOBAL CHATTER CATEGORIES

Remote & Arbitrary Code Execution are the most common vulnerabilities, along with Memory & Buffer vulnerabilities they recorded a notable increase in the middle of the last 90-day period.

VULNERABILITIES

EXTERNAL THREAT LANDSCAPE MANAGEMENT (ETLM) OVERVIEW

Risk Level Indicator: Low

In total, automotive comprises 0.95% of all detected industry vulnerabilities in the last 90 days, ranking as the 2nd least frequently mentioned industry.
Below are the observed key trends across 90 days.

Spike in February, Drop in March
Jan: 4 → Feb: 28 → Mar: 11
February saw a significant surge, but mentions dropped by over 60% in March.

February Surge Driven by RCE Vulnerabilities
Jan: 3 → Feb: 18 → Mar: 5
RCE was the main driver of the February spike, signaling critical exposure.

March Focus: Privilege Escalation & Web-Based Threats
Privilege Escalation: Increased to 2 in March (from 0 in Jan)
Cross-Site Scripting (XSS): 2 in March (up from 0 in Feb)

Low But Persistent Vulnerabilities
Injection Attacks: 1 each in Feb & Mar
Denial of Service: Minimal activity across months
Memory/Buffer Issues: Only seen in Feb (6 mentions)

RANSOMWARE VICTIMOLOGY

In the past 90 days, CYFIRMA has identified 36 verified ransomware victims in the automotive industry. This accounts for 1.8% of the overall total of 1,987 ransomware victims during the same period, placing the automotive industry as the least frequent victim of ransomware.

Furthermore, a quarterly comparison reveals a mild decrease of interest in the automotive industry of -20% from 45 to 36 victims. The overall share increased from 2.6% to 1.8%.

INDUSTRY MONTHLY ACTIVITY CHART

Over the past 180 days, we have observed swinging activity across months. This is largely due to relatively low activity overall. However, the activity remains sustained, and it is important to note that the automotive industry is considerably narrow in scope compared to other industry categories tracked.

BREAKDOWN OF ACTIVITY PER GANG

A breakdown of the monthly activity provides insights into which gangs were active each month. For example, the second most active gang Cl0p recorded all victims in February. On the other hand, the Medusa gang recorded victims only in January and March.

BREAKDOWN OF ACTIVITY PER GANG

In total 17 out of 64 gangs were active in last 90 days. Lynx gang recorded the most victims (5), followed by Cl0p (4), and Qilin (4).
The share of all victims for most gangs in this industry is relatively low, with the exception of Ciphit (25%) and Hellcat (16.7%). But those are skewed by an overall small number of victims by the respective gangs.

Out of top 10 gangs 7 have around 5-6% share, and 3 are below 2%.

VICTIMS PER INDUSTRY SECTOR

Dealerships are by a large margin the most frequent automotive victims of ransomware.

GEOGRAPHIC DISTRIBUTION OF VICTIMS

The geographic distribution heatmap underscores the widespread impact of ransomware, highlighting the countries where victims in this industry have been recorded. Notable is its growing presence in Latin America.

INDUSTRY VICTIMS PER COUNTRY

The chart shows quarter-to-quarter changes in targeted countries. Data is sorted by last 90 days and compared to previous 90 days marked blue.

We can see the USA dominating the automotive ransomware victimology followed by the UK, Canada, France, and Japan.

RANSOMWARE

EXTERNAL THREAT LANDSCAPE MANAGEMENT (ETLM) OVERVIEW

Risk Level Indicator: Low

The automotive industry is placed as the least frequent victim, recording only 36 victims in the last 90 days.
Overall share decreased from 2.6% to 1.8% of all ransomware victims.

Monthly Activity Trends
Ransomware activity in the automotive industry was generally low with swinging activity across months.

Lynx was the most active gang overall followed by Cl0p and Qilin.

Ransomware Gangs

A total of 17 out of 64 active ransomware groups targeted this industry in the past 90 days:

Lynx: The most active with 5 victims and 5% of their victims are from the automotive sector (5 out of 100 victims).
Cl0p: Second most active with a share of only 1.0% victims in this industry (4 out of 401 victims). It presents a risk due to high activity.

Overall 7 out of the top 10 gangs recorded ~5%+ share of their victims in the automotive industry, the other 3 were below 2%, suggesting no high focus.

Geographic Distribution
The geographic distribution of ransomware victims in the automotive industry is mostly represented by the USA (13) accounting for 36% of all victims. The UK, Canada, France, Japan and Denmark are in the top 5 most attacked countries.

In total, 16 countries recorded ransomware victims in this industry in the last 90 days, which is an increase from 18 countries in the previous 90 days.

For a comprehensive, up-to-date global ransomware tracking report, please refer to our new monthly “Tracking Ransomware” series here.

CONCLUSION

Over the past 90 days, the automotive industry faced a moderate risk from APT campaigns, limited but growing underground chatter, a low vulnerability volume with a notable February spike, and relatively low ransomware activity:

APT Campaigns: Two of five observed campaigns (40%) targeted automotive—an increase from the previous 90-day period. Chinese threat actors Salt Typhoon and Volt Typhoon were implicated, impacting 12 countries. Attacks primarily targeted web applications, operating systems, and additional infrastructure components such as routers and network monitoring tools.

Underground and Dark Web Chatter:Automotive made up only 0.82% of detected chatter (least among monitored sectors), yet mention volumes rose by 80%. Ransomware references surged by 578% (to 61 mentions) from January to March, and web exploits jumped significantly in March. DDoS activity declined, while hacktivism remained sporadic.

Vulnerabilities: The sector accounted for 0.95% of identified vulnerabilities, ranking as the second least mentioned. A sharp spike in February was predominantly driven by remote code execution (RCE) flaws. During March focus shifted toward privilege escalation and web-based threats, with memory/buffer issues prominent only in February.

Ransomware:Automotive was the least targeted sector, recording 36 victims (1.8% share, down from 2.6%). Lynx had the most confirmed victims (5), accounting for 5% of its total. The U.S. led victim geography at 36%, followed by the U.K., Canada, France, Japan, and Denmark. Overall, attacks were dispersed across 16 countries, up slightly from 18 in the prior period.