By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    McDonald’s Delaware Court Decision Will Change CCO World Forever
    21 February 2023
    Health Equity: Board Directors’ Most Important ESG Measure
    7 May 2023
    News Roundup: 75% of US Companies Mention Climate Risk in 10-Ks
    15 June 2024
    Latest News
    US Finalizes CMMC Rule: Cybersecurity Verification Now Determines Contract Eligibility for Defense Contractors
    13 December 2025
    Top 10 Risk & Compliance Trends for 2026
    7 December 2025
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    How to Detect New Threats via Suspicious Activities
    21 February 2023
    3 Steps to Automate Your Third-Party Risk Management Program
    22 February 2023
    Clipper Malware Found in 450+ PyPI Packages!
    24 February 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    Best Amazon deal: Spend $40, save $10 on makeup, skincare, vitamins, and more
    22 February 2023
    PlayStation’s State of Play Livestream Coming Thursday: How to Watch, Start Time
    23 February 2023
    Meet the couple that built an EV rock crawler for King of the Hammers
    24 February 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Missing Chinese banker was working to set up Singapore family office
    22 February 2023
    European countries step up delivery of tanks to Ukraine
    23 February 2023
    Borealis Foods to Go Public via Merger with Oxus Acquisition Corp
    24 February 2023
    Latest News
    Blue Owl Technology Finance stock initiated with Buy rating by B.Riley
    16 December 2025
    Client Challenge
    15 December 2025
    At least 2 killed and 8 injured hurt in shooting at Brown University with suspect still at large
    14 December 2025
    Thailand vows to keep fighting Cambodia, despite Trump's ceasefire claim
    13 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Stream episode Cybercrime Wire For Feb. 25-26, 2023. Weekend Update. WCYB Digital Radio. by Cybercrime Magazine podcast
    25 February 2023
    Cyberwarfare Report, Week Of Mar. 3, 2023. Theresa Payton Reporting.
    5 March 2023
    Global CISO Report. The Human Side Of Security. Mary Rose Martinez, Marathon Petroleum Corporation.
    14 March 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: VW Cars Leak Private Data of 800,000 — ‘Volksdaten’
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > VERACODE > VW Cars Leak Private Data of 800,000 — ‘Volksdaten’
VERACODE

VW Cars Leak Private Data of 800,000 — ‘Volksdaten’

webmaster
Last updated: 2025/01/01 at 2:51 PM
webmaster
Share
8 Min Read
SHARE
Launch of the all-electric Volkswagen ID.3 at the Frankfurt Motor ShowCariad, VW Group’s software arm, made this classic  error.

Personal data from hundreds of thousands of cars sat unsecured for about six months. Volkswagen was keeping it in an Amazon cloud storage instance, but didn’t secure the keys.

The big German firm ist sehr verlegen. In today’s SB  Blogwatch, we hope for a safer 2025.

Your humble blog­watcher curated these bloggy bits for your enter­tain­ment. Not to mention:  2024 in film.

CCC: Cariad Car Chaos

What’s the craic? Patrick Beuth, Flüpke, Max Hoppenstedt, Michael Kreil, Marcel Rosenbach and Rina Wilkin are lost in translation: We know where your car is

“It is a disgrace”
Several terabytes of data on around 800,000 electric cars was largely unprotected and accessible for months in an Amazon cloud storage system. VW, Seat, Audi and Skoda vehicles in … Europe and other parts of the world are affected. And … much of the vehicle data could be linked to the names and contact details of the drivers [or] owners.
…
Precise location data was available for 460,000 vehicles, allowing conclusions to be drawn about the lives of the people behind the wheel [including] the Hamburg police … and suspected intelligence service employees. … It might be interesting for foreign intelligence services to see whose car is parked near Federal Intelligence Service buildings or is driving to the U.S. Air Force airfield in Ramstein … every day.
…
It is a more than embarrassing glitch. … It is a disgrace. … Especially in the area of security of private data, which the Germans like to cite as a location advantage over the much more lax USA. [Not] even bored teenagers would have had any real challenge in gaining access. Everything was out in the open, you just had to know where to look.

Oops. Thanos Pappas accelerates: Massive VW Data Leak

“Urgency”
Sometimes, the worst breaches come not from shadowy cybercriminals but straight from the companies we trust. … Someone with the right know-how could casually snoop on your car’s whereabouts and habits. … And not just briefly, but for months on end.
…
This glaring error originated from Cariad, a VW Group company that focuses on software, due to an error that occurred in the summer of 2024. An anonymous whistleblower used freely accessible software to dig up the sensitive information and promptly alerted Chaos Computer Club (CCC), Europe’s largest [ethical] hacker association. … According to CCC, Cariad’s technical team “responded quickly, thoroughly and responsibly,” blocking unauthorized access to its customers’ data.
…
[But] automakers need to ensure they’re doing more than playing catch-up. … It’s time for the auto industry to treat cybersecurity with the same urgency as crash safety.

What has VW got to say for itself? Ionut Ilascu indicates: Customer data from 800,000 electric cars and owners exposed online

“Access keys”
Cariad says … access to the car data was possible due to … incorrect configuration in two IT applications [and] that the CCC hackers could access the data only after bypassing several security mechanisms that required significant time and technical expertise. [But] a team of IT experts and journalists … found location details collected from the cars of two German politicians … using freely available software.
…
[They] searched for exposed Cariad assets that contained files with sensitive information, which led to finding a copy of a memory dump from an internal Cariad application. Inside the memory dump the hackers discovered access keys to a cloud storage instance on Amazon.

How can car firms avoid data loss? Don’t collect it in the first place! So says cherryteastain:

We need a way to disable vehicle telemetry. No, a software switch is not enough.

We need to be able to physically unplug the cellular modem entirely and have the vehicle work with 100% functionality (barring features which inherently require cellular connectivity). … Car manufacturers’ features are mostly useless anyway thanks to Android Auto/Apple CarPlay.

But would that work? Zarhan has first hand experience:

I’m so darn glad I disabled GPS on my car. … Day one after getting home with the car was to hook up OBDEleven into it, go to the telematics module, and disable GPS. … The location info has shown the car being parked in my yard for the past four years.
…
Only problem is that the remote control functions like heating and the like start to fail every few months, because apparently the protocol used between the car and VW Group’s servers have some timestamps in them, and after a few months the car’s clock has started drifting. So I’ll enable GPS for a few minutes to get the clock back into sync and then disable it again.

How does such a leak happen? After all, VW Group is hardly a fly-by-night operation. Žilvinas has seen it all before:

That’s pretty common in legacy enterprises. No one really understands anything about IT safety. All they care about is getting expensive lawyers to write GDPR compliance papers.

Is this the en****tification of legacy cars? oellegaard thinks it’s a wider problem:

I own both a Mercedes and a Skoda (owned by VW) and I feel like both companies are headed in an extremely bad direction. … Now Mercedes wants to charge me 200–300 USD/year for navigation and the ability to remotely lock your door.
…
I don’t have any faith in Tesla either. … If I were to buy a car today, I’m not sure where to look.

But shouldn’t there be an opt in? Smidge204 eyerolls furiously:

Tell me you’ve never leased or purchased a new car without telling me. Surely you’re aware that the process involves a certain amount of paperwork? What do you suppose they need so many signatures for?

Spoiler alert: One of those is agreeing to the Terms of Service for their telematics service, giving them permission to spy on your driving habits. … It’s all there buddy, have fun.

Meanwhile, how might one exploit such a vuln? olddog2 shows off a new trick: [You’re fired—Ed.]

Find the guys who usually park at expensive family homes, but occasionally visit a known brothel. Then blackmail them.

And Finally:

How does this only have 100 views?

Previously in And Finally


You have been reading SB Blogwatch by Richi Jennings. Richi curates the best bloggy bits, finest forums, and weird­est web­sites—so you don’t have to. Hate mail may be directed to  @RiCHi, @richij, @[email protected], @richi.bsky.social or [email protected]. Ask your doctor before reading. Your mileage may vary. Past per­formance is no guar­antee of future results. Do not stare into laser with re­maining eye. E&OE. 30.

Image sauce: Rutger van der Maar (cc:by; leveled and cropped)

Contents
Cariad, VW Group’s software arm, made this classic  error.CCC: Cariad Car ChaosAnd Finally:

You Might Also Like

Evaluating AI’s ability to perform scientific research tasks

Best Agentic Pentesting Tools in 2026

Three New React Vulnerabilities Surface on the Heels of React2Shell

BNY builds “AI for everyone, everywhere” with OpenAI

How We Used Codex to Ship Sora for Android in 28 Days

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article From Prompt Injection To Account Takeover · Embrace The Red
Next Article The Cumulus Machine Review: Fast and Frothy Cold Brew
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

Evaluating AI’s ability to perform scientific research tasks
Application Security ARTIFICIAL INTELLIGENCE (AI) CHECKMARKX Innovation VERACODE 16 December 2025
Fair Credit Reporting Act Updates
CHECKMARKX 16 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 16 December 2025
Switzerland to tighten rules on military service for dual nationals
SWITZERLAND 16 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?