logo
#

Latest news with #darkweb

Ransomware in Cars: Why Automotive Cyberattacks Are Spiking in 2025
Ransomware in Cars: Why Automotive Cyberattacks Are Spiking in 2025

Auto Blog

time5 hours ago

  • Automotive
  • Auto Blog

Ransomware in Cars: Why Automotive Cyberattacks Are Spiking in 2025

Why Car Cybersecurity Can't Be Ignored Imagine treating a ticking time bomb as background noise. That's how many in the automotive industry have approached ransomware. Ransomware now accounts for 45% of all automotive cyber incidents so far in 2025, making it the leading threat to the sector. The scale of these attacks is also increasing: large-scale incidents affecting millions of vehicles more than tripled in 2024, and nearly 60% of all reported cyber events in 2023–2024 were large-scale in nature 0:06 / 0:09 2025 Ford Maverick: 4 reasons to love it, 2 reasons to think twice Watch More There is strong evidence that the number of publicly disclosed automotive ransomware attacks is only a fraction of the true total. Many incidents are never disclosed. 148 publicly disclosed automotive cyber incidents were tracked in just the first quarter of 2025, but cybersecurity experts warn it is just getting started: 'The pieces are in place for a transition from today's manual, car-modding hacks to more harmful and larger-scale attacks,' and that criminal activity on the dark web points to a much broader, largely hidden threat landscape. In a world where drivers expect more than just horsepower, digital security has become as essential as the engine itself. The New Threat in the Driver's Seat Today's cars are marvels of connectivity, but this convenience comes with risk. Picture a journalist at a dealership, eyeing rows of sleek sedans. Each keypad and dashboard screen seems harmless—until malware hidden in the firmware threatens to lock down the entire vehicle. That 45% breach statistic isn't just a number; it's a warning. What if, the next time you start your car, you're met with a ransom note instead of the familiar engine hum? When Code Becomes a Weapon Ransomware attacks on car manufacturers often start with a weak link—stolen credentials from suppliers or compromised service portals. Once inside, attackers can encrypt vital systems: infotainment, navigation, even the ignition. An encrypted Electronic Control Unit (ECU) can make starting your car impossible until a ransom is paid. Unlike the data breaches of the past, these attacks don't just steal information—they can bring your car to a standstill. Autoblog Newsletter Autoblog brings you car news; expert reviews and exciting pictures and video. Research and compare vehicles, too. Sign up or sign in with Google Facebook Microsoft Apple By signing up I agree to the Terms of Use and acknowledge that I have read the Privacy Policy . You may unsubscribe from email communication at anytime. Vulnerabilities in the Supply Chain The automotive supply chain is vast and complex, providing more opportunities for cybercriminals. A single phishing email to a small supplier can lead to malicious code being embedded in a firmware update, which then spreads to thousands of vehicles. Compromised update servers can deliver ransomware-laden patches, infecting entire fleets in minutes. Ironically, even the most security-conscious manufacturers can inherit vulnerabilities from distant partners. Everyday Routines, Unusual Risks Consider your morning routine: coffee in hand, you tap 'Start' on your car's smartphone app—only to find your vehicle locked by ransomware. The cost of negotiating with hackers may exceed typical repair bills, and insurers are still figuring out how to handle these new risks. Meanwhile, online forums buzz with debates over which software updates fix vulnerabilities and which might accidentally introduce new ones. Delayed security patches can leave vehicles exposed for weeks, making every drive a potential gamble. Trust on the Open Road Modern vehicles offer dazzling features and seamless connectivity, but these advances come with serious questions. When convenience can so easily turn into coercion, will drivers still trust their cars? On the open highway, does the engine's roar reassure you—or remind you of the silent code that could one day hold you hostage? You're not powerless against this wave of automotive ransomware—there are concrete steps you can take right now to protect yourself and your EV: Start by disabling remote access features when you don't need them. Always use strong, unique passwords for your car's apps and accounts. Keep your vehicle's software and apps updated; patches often fix vulnerabilities before hackers can exploit them. Be cautious with Bluetooth, Wi-Fi, and public charging stations. Secure your key fob in a signal-blocking pouch. Avoid connecting to unfamiliar networks. If you add aftermarket gadgets, choose only trusted brands and check their security track record. Stay alert for official security updates from your automaker and report any unusual vehicle behavior immediately. A little digital vigilance goes a long way—taking these steps can help keep your car, your data, and your daily routine safe from cybercriminals. About the Author Brian Iselin View Profile

Dark web's longest-standing drug market worth £200million is busted with 30-year-old German 'Big Boss' mastermind arrested in Barcelona after global police operation
Dark web's longest-standing drug market worth £200million is busted with 30-year-old German 'Big Boss' mastermind arrested in Barcelona after global police operation

Daily Mail​

time11 hours ago

  • Daily Mail​

Dark web's longest-standing drug market worth £200million is busted with 30-year-old German 'Big Boss' mastermind arrested in Barcelona after global police operation

The longest-standing dark web drug market worth £200million has been dismantled following a years-long investigation, as its mastermind is arrested in Barcelona. The site, known as Archetyp Market, was busted last week by European authorities with the help of the US in an effort dubbed 'Operation Deep Sentinel'. Europol said in a statement on Monday that between June 11 and 13, 300 officers were deployed to carry out a 'series of coordinated actions' across Germany, the Netherlands, Romania, Spain and Sweden targeting the platform's administrators, vendors and technical infrastructure. It added that the platform's infrastructure in the Netherlands was taken offline and that the mastermind behind the operation - a 30-year-old German known as 'Big Boss' - had been arrested in Barcelona. Users of the Archetyp Market website are now met with a banner informing them the site has been taken down. 'This operation led by the German authorities marks the end of a criminal service that enabled the anonymous trade in high volumes of illicit drugs, including cocaine, MDMA, amphetamines, and synthetic opioids', the statement said. Europol said the takedown comes after years of investigation into the platform's 'technical architecture' and the individuals behind it, adding that its findings were achieved by analysing digital forensic evidence. Europol's Deputy Executive Director of Operations Jean-Philippe Lecouffe said: 'With this takedown, law enforcement has taken out one of the dark web's longest-running drug markets, cutting off a major supply line for some of the world's most dangerous substances. 'By dismantling its infrastructure and arresting its key players, we are sending a clear message: there is no safe haven for those who profit from harm.' It comes after international law enforcement agencies led by the FBI seized a sprawling dark web marketplace popular with cybercriminals back in 2023. The hacker cyber-bazaar, known as Genesis Market, was seized in a multinational crackdown dubbed 'Operation Cookie Monster' after the site's specialization in stolen digital fingerprints, known as cookies. According to the FBI, Genesis Market offered access to data stolen from more than 1.5 million compromised computers around the world, containing over 80 million account access credentials. The stolen data included passwords for services such as online banking, Facebook, Amazon, PayPal and Netflix, as well as digital fingerprints that can be exploited by criminals to bypass online security checks by spoofing the victim's device. In coordinated raids around the world, more than 200 searches were carried out and about 120 people were arrested, including 24 arrests in and around the British town of Grimsby, UK law enforcement officials said. The raid on Genesis followed a similar US-led enforcement actions in 2023 against other darknet hacker market places, including Hydra Market and Breach Forums. But experts warned that hacker gangs are often slippery, and similar markets often soon re-emerge.

Man pleads guilty in dark web firearms charge
Man pleads guilty in dark web firearms charge

Irish Times

time2 days ago

  • Irish Times

Man pleads guilty in dark web firearms charge

One of three Co Wicklow men arrested following the discovery of two firearms purchased off the dark web has pleaded guilty to possessing one of the weapons. Daniel Quinn Burke, whose address was given as Allendale Lawn, Baltinglass, appeared before Naas Circuit Court on Wednesday along with Shane Kinsella, whose address was given as Tynock, Kiltegan. Mr Quinn Burke, previously described as an apprentice mechanic, pleaded guilty to possessing a firearm, a Remington semi-automatic pistol on March 2nd, 2024, at Ponsonby Bridge, near Straffan, Co Kildare . Defending barrister Aisling Murphy told Judge Elva Duffy that the defendant, aged 22, had not been in court before. READ MORE Barrister Mark Gibbons, representing Mr Kinsella, asked that the case against his client be adjourned 'for mention or progress'. Mr Kinsella did not address the court. The judge said she would seek a probation report on behalf of Mr Quinn Burke, who was remanded on continuing bail. His case was adjourned to October 7th. The case against Mr Kinsella was adjourned to July 18th. At an initial hearing at Naas District Court on March 4th, 2024, it was alleged that officers attached to the Garda National Organised Crime Bureau and the Emergency Response Unit performed a controlled stop of a vehicle at Ponsonby Bridge. A third man, Evan Fitzgerald , then 21, a steel company worker, whose address was given as Portrushen, Kiltegan, died in a shooting incident at a Carlow shopping centre on June 1st. Mr Kinsella, described as a student, was then aged 20. The trio were charged following the discovery of a Heckler & Koch rifle, a Remington Rand semi-automatic pistol and a total of 42 rounds of ammunition. [ Garda inquiry into Evan Fitzgerald followed tip-off about Irish person trying to buy guns on darknet Opens in new window ] At the District Court hearing before Judge Desmond Zaidan, Det Gda Gavin Curran said he believed the items found were not destined for use by organised criminals and he believed that the guns and bullets were to be used for shooting purposes in a wooded area. The garda said the value of the firearms was in the region of €2,700 and were bought on the Darknet. Referring to Evan Fitzgerald, he said the defendant has a fascination with firearms and 'it's more of an interest or a hobby' rather than for 'nefarious purposes'. The court was also told that the weapons and ammunition were delivered by face-to-face delivery. The garda said the defendants are lifelong friends. The arrests were part of an operation to combat firearms trafficking.

Dark web drug market busted by European and US authorities
Dark web drug market busted by European and US authorities

Reuters

time4 days ago

  • Reuters

Dark web drug market busted by European and US authorities

BRUSSELS, June 16 (Reuters) - Police across Europe have dismantled a dark web drug marketplace known as 'Archetyp Market', the pan-European Europol police body said on Monday, which added that U.S. authorities had also assisted them in the operation. Europol said police operations took place last week across Germany, the Netherlands, Romania, Spain and Sweden to dismantle the dark web Archetyp Market. It added that the platform's infrastructure in the Netherlands was taken offline and that a 30-year-old German who was the administrator had been arrested in Barcelona. Europol said Archetyp had been one of the few darknet markets that allowed the sale of fentanyl and other highly potent synthetic opioids. "With this takedown, law enforcement has taken out one of the dark web's longest-running drug markets, cutting off a major supply line for some of the world's most dangerous substances," said Jean-Philippe Lecouffe, deputy executive director of operations at Europol. "By dismantling its infrastructure and arresting its key players, we are sending a clear message: there is no safe haven for those who profit from harm," added Lecouffe.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store