Ferrari Says Ransomware Attack Exposed Customer Data

Share This Post

Italian sports car maker Ferrari said on Monday that a threat actor had demanded a ransom related to customer contact details that may have been exposed in a ransomware attack.

“Upon receipt of the ransom demand, we immediately started an investigation in collaboration with a leading global third-party cybersecurity firm,” the iconic car maker said. “In addition, we informed the relevant authorities and are confident they will investigate to the full extent of the law.”

The company did not say when the incident occurred, but it could be related to reports of a ransomware attack back in October 2022, when the “RansomEXX” group claimed it had stolen and leaked 7 GB of data from Ferrari—which Ferrari denied at the time.

“As a policy, Ferrari will not be held to ransom as paying such demands funds criminal activity and enables threat actors to perpetuate their attacks,” Ferrari said in a statement on March 20. “Instead, we believed the best course of action was to inform our clients and thus we have notified our customers of the potential data exposure and the nature of the incident.”

In notifications sent via email to customers, Ferrari said the exposed information includes name, address, email address, and phone number. The company has found no evidence that financial information and details on owned or ordered cars have been compromised.

With Ferrari having one of the most expensive car lineups in the word, a contact list of wealthy customers is very attractive to cybercriminals and could give them the opportunity to customize malicious, targeted emails.

Ferrari said the breach has not impacted operational functions of the company and that it has worked with “third party experts” to boost the security of its systems.

While Ferrari did not mention RansomEXX in its statement, the ransomware gang has been connected to several other attacks, including logistics giant Hellmann Worldwide, software and services firm Tyler Technologies, and several others.

Related: Cyber Insights 2023 Ransomware

SecurityWeek RSS Feed

Read More

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.