ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The Volvo Group is one of the world’s leading manufacturers of trucks, buses, construction equipment and marine and industrial engines. The Group also provides complete solutions for financing and service. The Volvo Group, with its headquarters in Gothenburg, employs about 100,000 people, has production facilities in 18 countries and sells its products in more than 190 markets.

Volvo Group A.I CyberSecurity Scoring

Volvo Group

Company Details

Linkedin ID:

volvo-group

Employees number:

77,329

Number of followers:

2,132,592

NAICS:

3361

Industry Type:

Motor Vehicle Manufacturing

Homepage:

volvogroup.com

IP Addresses:

147

Company ID:

VOL_3354219

Scan Status:

Completed

AI scoreVolvo Group Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/volvo-group.jpeg
Volvo Group Motor Vehicle Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreVolvo Group Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/volvo-group.jpeg
Volvo Group Motor Vehicle Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Volvo Group Company CyberSecurity News & History

Past Incidents
6
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Volvo GroupBreach100504/2023
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: The Volvo automobile manufacturer's Brazilian retail division exposed private information, endangering its patrons in the enormous nation of South America. The compromised files may have been used by hostile actors to compromise company systems and control official communication channels. The investigative team at Cybernews found that for almost a year, the Brazilian dealer of Volvo cars, Dimas Volvo, had been exposing private information online. The store for Volvo disclosed the hosts, open ports, and credentials for its MySQL and Redis databases as well as information about database authentication. These credentials could further be exploited to access the contents of the databases, which might have stored private user data.

Volvo GroupBreach100512/2021
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The carmaker Volvo suffered a data breach incident recently in December 2021. The ransomware group Snatch targeted the company and stole its R&D data and leaked some of it on the dark web. However, the customer data was not compromised in the attack.

Volvo North AmericaRansomware8538/2023
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Volvo North America suffered a **ransomware attack** on its HR system provider, **Miljödata**, in August 2023. The **DataCarry ransomware group** breached Miljödata’s **Adato system**—a platform managing employee sick leave and rehabilitation—exfiltrating sensitive data. For Volvo, the attack exposed **employees' first and last names along with Social Security numbers (SSNs)**. While other affected organizations faced broader data leaks (e.g., phone numbers, addresses, emails, and dates of birth), Volvo’s breach was limited to **employee identity data**. The attack disrupted **200 Swedish municipalities** relying on Miljödata’s software, with **1.5 million individuals impacted** overall, including employees from companies like **SAS Airlines** and multiple universities. Miljödata confirmed the breach on **August 25**, three days after detection, and initiated remediation with cybersecurity experts. The stolen data was later **published on the dark web** by DataCarry. Volvo emphasized ongoing monitoring but did not disclose the full scale of its internal exposure beyond SSNs and names.

Volvo GroupRansomware8535/2025
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Volvo Group disclosed a ransomware attack on its third-party HR software provider, **Miljödata**, which may have exposed personal data of its **North American workforce**. The breach, detected on **August 23, 2025**, involved unauthorized access to **employee names and Social Security numbers (SSNs)**, though no payroll, bank, or insurance details were compromised. While Volvo’s own IT systems remained unaffected, the incident highlights **third-party vendor risks** and the potential for **identity theft and fraud** due to the exposure of sensitive SSNs. Volvo is collaborating with Miljödata for forensic investigations, enhancing vendor security protocols, and offering affected employees **18 months of free identity protection services**, including credit monitoring and dark-web surveillance. The company has also advised employees to monitor financial statements and place fraud alerts. This breach underscores the critical need for **robust vendor cybersecurity oversight** to mitigate future risks.

Volvo Group North AmericaRansomware8538/2025
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Volvo Group North America disclosed a data breach after its third-party HR software supplier, **Miljödata**, suffered a **ransomware attack** in August 2025. The incident exposed **personal data of employees**, including **names, Social Security numbers, email addresses, physical addresses, phone numbers, government IDs, dates of birth, and gender**. The **DataCarry ransomware group** claimed responsibility and leaked **870,000 unique email addresses** and associated sensitive records on the dark web. While Volvo’s internal systems remained uncompromised, the breach impacted HR-related data managed by Miljödata, such as **medical certificates, rehabilitation records, and work-related injury reports**. Affected employees were offered **18 months of free identity protection and credit monitoring** to mitigate risks. The attack also affected other organizations, including **Scandinavian Airlines (SAS), Boliden, and 200 Swedish municipalities**, highlighting the broad impact of the supply-chain compromise.

VolvoRansomware10069/2025
Rankiteo Explanation :
Attack threatening the economy of geographical region

Description: A major data breach in Sweden resulted in the theft of personal information belonging to over **1.5 million citizens**, accounting for nearly **15% of the country’s population**. The attack, attributed to the hacker group **Datacarry**, targeted regional administrations, municipalities, and corporations, including **Volvo** and the airline **SAS**. Compromised data included **names, addresses, contact details of employees and citizens**, as well as sensitive corporate information. The attackers demanded a ransom of **1.5 bitcoin (~€147,000)** for data recovery. Swedish prosecutors confirmed no evidence of state-sponsored involvement, but the scale of the breach—affecting both public and private sectors—raises severe concerns over systemic vulnerabilities. The incident highlights risks to **national data security, corporate espionage, and citizen privacy**, with potential long-term reputational and operational damages for affected entities like Volvo, whose proprietary and employee data were exposed.

Volvo Group
Breach
Severity: 100
Impact: 5
Seen: 04/2023
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: The Volvo automobile manufacturer's Brazilian retail division exposed private information, endangering its patrons in the enormous nation of South America. The compromised files may have been used by hostile actors to compromise company systems and control official communication channels. The investigative team at Cybernews found that for almost a year, the Brazilian dealer of Volvo cars, Dimas Volvo, had been exposing private information online. The store for Volvo disclosed the hosts, open ports, and credentials for its MySQL and Redis databases as well as information about database authentication. These credentials could further be exploited to access the contents of the databases, which might have stored private user data.

Volvo Group
Breach
Severity: 100
Impact: 5
Seen: 12/2021
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: The carmaker Volvo suffered a data breach incident recently in December 2021. The ransomware group Snatch targeted the company and stole its R&D data and leaked some of it on the dark web. However, the customer data was not compromised in the attack.

Volvo North America
Ransomware
Severity: 85
Impact: 3
Seen: 8/2023
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Volvo North America suffered a **ransomware attack** on its HR system provider, **Miljödata**, in August 2023. The **DataCarry ransomware group** breached Miljödata’s **Adato system**—a platform managing employee sick leave and rehabilitation—exfiltrating sensitive data. For Volvo, the attack exposed **employees' first and last names along with Social Security numbers (SSNs)**. While other affected organizations faced broader data leaks (e.g., phone numbers, addresses, emails, and dates of birth), Volvo’s breach was limited to **employee identity data**. The attack disrupted **200 Swedish municipalities** relying on Miljödata’s software, with **1.5 million individuals impacted** overall, including employees from companies like **SAS Airlines** and multiple universities. Miljödata confirmed the breach on **August 25**, three days after detection, and initiated remediation with cybersecurity experts. The stolen data was later **published on the dark web** by DataCarry. Volvo emphasized ongoing monitoring but did not disclose the full scale of its internal exposure beyond SSNs and names.

Volvo Group
Ransomware
Severity: 85
Impact: 3
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Volvo Group disclosed a ransomware attack on its third-party HR software provider, **Miljödata**, which may have exposed personal data of its **North American workforce**. The breach, detected on **August 23, 2025**, involved unauthorized access to **employee names and Social Security numbers (SSNs)**, though no payroll, bank, or insurance details were compromised. While Volvo’s own IT systems remained unaffected, the incident highlights **third-party vendor risks** and the potential for **identity theft and fraud** due to the exposure of sensitive SSNs. Volvo is collaborating with Miljödata for forensic investigations, enhancing vendor security protocols, and offering affected employees **18 months of free identity protection services**, including credit monitoring and dark-web surveillance. The company has also advised employees to monitor financial statements and place fraud alerts. This breach underscores the critical need for **robust vendor cybersecurity oversight** to mitigate future risks.

Volvo Group North America
Ransomware
Severity: 85
Impact: 3
Seen: 8/2025
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Volvo Group North America disclosed a data breach after its third-party HR software supplier, **Miljödata**, suffered a **ransomware attack** in August 2025. The incident exposed **personal data of employees**, including **names, Social Security numbers, email addresses, physical addresses, phone numbers, government IDs, dates of birth, and gender**. The **DataCarry ransomware group** claimed responsibility and leaked **870,000 unique email addresses** and associated sensitive records on the dark web. While Volvo’s internal systems remained uncompromised, the breach impacted HR-related data managed by Miljödata, such as **medical certificates, rehabilitation records, and work-related injury reports**. Affected employees were offered **18 months of free identity protection and credit monitoring** to mitigate risks. The attack also affected other organizations, including **Scandinavian Airlines (SAS), Boliden, and 200 Swedish municipalities**, highlighting the broad impact of the supply-chain compromise.

Volvo
Ransomware
Severity: 100
Impact: 6
Seen: 9/2025
Blog:
Rankiteo Explanation
Attack threatening the economy of geographical region

Description: A major data breach in Sweden resulted in the theft of personal information belonging to over **1.5 million citizens**, accounting for nearly **15% of the country’s population**. The attack, attributed to the hacker group **Datacarry**, targeted regional administrations, municipalities, and corporations, including **Volvo** and the airline **SAS**. Compromised data included **names, addresses, contact details of employees and citizens**, as well as sensitive corporate information. The attackers demanded a ransom of **1.5 bitcoin (~€147,000)** for data recovery. Swedish prosecutors confirmed no evidence of state-sponsored involvement, but the scale of the breach—affecting both public and private sectors—raises severe concerns over systemic vulnerabilities. The incident highlights risks to **national data security, corporate espionage, and citizen privacy**, with potential long-term reputational and operational damages for affected entities like Volvo, whose proprietary and employee data were exposed.

Ailogo

Volvo Group Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Volvo Group

Incidents vs Motor Vehicle Manufacturing Industry Average (This Year)

Volvo Group has 400.0% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Volvo Group has 289.61% more incidents than the average of all companies with at least one recorded incident.

Incident Types Volvo Group vs Motor Vehicle Manufacturing Industry Avg (This Year)

Volvo Group reported 3 incidents this year: 0 cyber attacks, 3 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Volvo Group (X = Date, Y = Severity)

Volvo Group cyber incidents detection timeline including parent company and subsidiaries

Volvo Group Company Subsidiaries

SubsidiaryImage

The Volvo Group is one of the world’s leading manufacturers of trucks, buses, construction equipment and marine and industrial engines. The Group also provides complete solutions for financing and service. The Volvo Group, with its headquarters in Gothenburg, employs about 100,000 people, has production facilities in 18 countries and sells its products in more than 190 markets.

Loading...
similarCompanies

Volvo Group Similar Companies

We don't just make history -- we make the future. Ford put the world on wheels over a century ago, and our teams are re-inventing icons and creating groundbreaking connected and electric vehicles for the next century. We believe in serving our customers, our communities, and the world. If you do, to

Continental develops pioneering technologies and services for sustainable and connected mobility of people and their goods. Founded in 1871, the technology company offers safe, efficient, intelligent and affordable solutions for vehicles, machines, traffic and transportation. In 2023, Continental ge

Grammer AG

Company profile GRAMMER AG, which has its head office in Ursensollen, specializes in the development and production of complex components and systems for automotive interiors as well as suspension driver and passenger seats for onroad and offroad vehicles. In the Automotive product area, the Company

Freudenberg Group

Freudenberg is a global technology group that strengthens its customers and society long-term through forward-looking innovations. Together with its partners, customers and research institutions, the Freudenberg Group develops leading-edge technologies and excellent products and services for about 4

Marelli

Marelli is a global, independent technology partner to the automotive industry, with a strong and established track record in innovation and manufacturing excellence. As mobility is evolving fast and global trends drive unprecedented innovation, we leverage our expertise in integrating software and

Honda Cars India Ltd

Honda Cars India Ltd. (HCIL), a leading manufacturer of premium cars in India, was established in December 1995 with a commitment to provide Honda’s passenger car models and technologies, to the Indian customers. HCIL’s corporate office is based in Greater Noida, UP and its state-of-the-art manufact

Sumitomo Electric Bordnetze SE

Sumitomo Electric Bordnetze SE (SEBN) is a global automotive supplier with over 36,000 employees in 13 countries. SEBN is part of the Japanese group Sumitomo Electric Industries, which has 380 subsidiaries in various industries worldwide. The more than 400-year-old Sumitomo Electric Group employs 28

Tata Motors

At the forefront of shaping mobility for over eight decades, driven by a legacy of innovation and an unwavering commitment to excellence. We fuse next-generation technologies with operational precision and continuous value creation — across every vehicle and process. But what truly sets us apart is

Established in 1995, BYD is a top high-tech enterprise in China specializing in IT, automobile, and new energy.BYD is the largest supplier of rechargeable batteries in the globe, and has the largest market share for Nickel-cadmium batteries, handset Li-ion batteries, cell-phone chargers and keypads

newsone

Volvo Group CyberSecurity News

November 29, 2025 07:03 AM
Breaking Cybersecurity Threats Targeting the Construction Industry: November 2025 Update

By Charles Swihart, Founder and CEO of Preactive IT Solutions,. November 21, 2025. The construction and engineering sectors continue to face...

October 30, 2025 07:00 AM
Top 20 Voices in Automotive 2025 | Automotive IQ

Automotive IQ is proud to present the Top 20 Voices in Automotive 2025 - honouring the industry leaders driving innovation, progress,...

October 23, 2025 01:44 PM
Top 20 Voices in Automotive 2025

Augustin Freidel Associated Partner Software Defined Vehicles, MHP A Porsche Company. Philip Koopman Faculty Emeritus Carnegie Mellon University.

October 07, 2025 07:00 AM
Volvo Group discloses data breach after HR supplier attack

Volvo Group North America has alerted its employees and associates about a data breach that compromised their personal information,...

October 06, 2025 07:00 AM
Volvo Energy Unveils PU2000 Battery Energy Storage System

Volvo Energy Unveils PU2000 Battery Energy Storage System. Volvo Energy has launched the PU2000 Battery Energy Storage System in Gothenburg,...

October 01, 2025 07:00 AM
Volvo Group introduces PU2000: a smart, safe and energy cost optimized BESS

Volvo Energy, part of the Volvo Group, today officially introduces the PU2000 Battery Energy Storage System (BESS) at its Customer Day in...

October 01, 2025 07:00 AM
Top Data Breaches In September 2025

September 2025 saw major data breaches affecting Volvo, Gucci, European airports, Wealthsimple, and Harrods. From HR data to critical...

October 01, 2025 07:00 AM
New PU2000 BESS from Volvo Energy

Volvo Energy, part of Volvo Group, has unveiled the PU2000 Battery Energy Storage System (BESS) at its Customer Day in Gothenburg.

October 01, 2025 07:00 AM
New PU2000 BESS Positions Volvo Energy in Growing Global Market

Volvo Energy has launched its new stationary battery energy storage system, the PU2000, expanding the Volvo Group's portfolio into...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Volvo Group CyberSecurity History Information

Official Website of Volvo Group

The official website of Volvo Group is https://www.volvogroup.com.

Volvo Group’s AI-Generated Cybersecurity Score

According to Rankiteo, Volvo Group’s AI-generated cybersecurity score is 338, reflecting their Critical security posture.

How many security badges does Volvo Group’ have ?

According to Rankiteo, Volvo Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Volvo Group have SOC 2 Type 1 certification ?

According to Rankiteo, Volvo Group is not certified under SOC 2 Type 1.

Does Volvo Group have SOC 2 Type 2 certification ?

According to Rankiteo, Volvo Group does not hold a SOC 2 Type 2 certification.

Does Volvo Group comply with GDPR ?

According to Rankiteo, Volvo Group is not listed as GDPR compliant.

Does Volvo Group have PCI DSS certification ?

According to Rankiteo, Volvo Group does not currently maintain PCI DSS compliance.

Does Volvo Group comply with HIPAA ?

According to Rankiteo, Volvo Group is not compliant with HIPAA regulations.

Does Volvo Group have ISO 27001 certification ?

According to Rankiteo,Volvo Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Volvo Group

Volvo Group operates primarily in the Motor Vehicle Manufacturing industry.

Number of Employees at Volvo Group

Volvo Group employs approximately 77,329 people worldwide.

Subsidiaries Owned by Volvo Group

Volvo Group presently has no subsidiaries across any sectors.

Volvo Group’s LinkedIn Followers

Volvo Group’s official LinkedIn profile has approximately 2,132,592 followers.

NAICS Classification of Volvo Group

Volvo Group is classified under the NAICS code 3361, which corresponds to Motor Vehicle Manufacturing.

Volvo Group’s Presence on Crunchbase

Yes, Volvo Group has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/ab-volvo.

Volvo Group’s Presence on LinkedIn

Yes, Volvo Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/volvo-group.

Cybersecurity Incidents Involving Volvo Group

As of December 11, 2025, Rankiteo reports that Volvo Group has experienced 6 cybersecurity incidents.

Number of Peer and Competitor Companies

Volvo Group has an estimated 12,645 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Volvo Group ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.

How does Volvo Group detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (by miljödata on 2025-08-23), and third party assistance with external cybersecurity experts engaged by miljödata for forensic investigation, and containment measures with isolation of affected systems, containment measures with notification to volvo group, and remediation measures with enhancement of miljödata's hosted environment security, and communication strategy with notification to affected employees via email and postal mail, communication strategy with provision of identity protection services (allstate identity protection pro+), communication strategy with guidance from volvo group's people services team, and enhanced monitoring with yes (implemented by miljödata post-incident), and and third party assistance with cybersecurity experts (unspecified), and containment measures with enhanced security of hosted environment, and recovery measures with preventive measures to avoid future breaches, and communication strategy with data breach notification letters to affected individuals, communication strategy with public disclosure via massachusetts ag, communication strategy with offer of 18-month identity protection (allstate’s identity protection pro+), and and incident response plan activated with yes (miljödata commenced investigation on august 23, 2023), and third party assistance with yes (cybersecurity experts engaged by miljödata), and law enforcement notified with yes (investigation led by swedish prosecutor sandra helgadottir), and containment measures with isolation of affected systems, containment measures with enhanced security of miljödata-hosted environment, and remediation measures with review of security policies, procedures, and tools, remediation measures with steps to prevent recurrence of similar incidents, and communication strategy with disclosure to affected organizations (e.g., volvo, sas), communication strategy with public filings (e.g., massachusetts attorney general's office), communication strategy with media statements, and enhanced monitoring with yes (implemented by miljödata)..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Volvo Data Breach Incident

Description: The carmaker Volvo suffered a data breach incident recently in December 2021. The ransomware group Snatch targeted the company and stole its R&D data and leaked some of it on the dark web. However, the customer data was not compromised in the attack.

Date Detected: December 2021

Type: Data Breach

Attack Vector: Ransomware

Threat Actor: Snatch

Motivation: Data Theft

Incident : Data Exposure

Title: Volvo Brazilian Retail Division Data Exposure

Description: The Volvo automobile manufacturer's Brazilian retail division exposed private information, endangering its patrons in the enormous nation of South America. The compromised files may have been used by hostile actors to compromise company systems and control official communication channels. The investigative team at Cybernews found that for almost a year, the Brazilian dealer of Volvo cars, Dimas Volvo, had been exposing private information online. The store for Volvo disclosed the hosts, open ports, and credentials for its MySQL and Redis databases as well as information about database authentication. These credentials could further be exploited to access the contents of the databases, which might have stored private user data.

Type: Data Exposure

Attack Vector: Credential Exposure

Vulnerability Exploited: Exposed Database Credentials

Incident : data breach

Title: Importante fuite de données en Suède affectant 1,5 million de citoyens

Description: Les informations personnelles de plus d’1,5 million de citoyens suédois (15 % de la population) ont été volées. Les pirates ont exigé une rançon de 1,5 bitcoin (≈ 147 000 €). Des communes, administrations régionales, ainsi que des entreprises comme Volvo et SAS, ont été touchées. Les données compromises incluent noms, adresses et coordonnées d’employés et de citoyens. L’attaque a été revendiquée par le groupe **Datacarry**, sans implication apparente d’une puissance étrangère selon les procureurs suédois.

Type: data breach

Threat Actor: Datacarry

Motivation: financial (ransomware)

Incident : ransomware

Title: Ransomware Attack on Volvo Group's HR Software Provider Miljödata Exposes Employee Data

Description: Volvo Group disclosed a ransomware attack on its third-party HR software provider, Miljödata, which may have resulted in unauthorized access to personal information of its North American workforce. The attack encrypted Miljödata's systems and disrupted operations, with the breach confined to the vendor’s environment. Basic personal identifiers, including first and last names and Social Security numbers, were compromised, elevating the risk of identity theft for affected employees. Volvo Group is providing 18 months of complimentary identity protection services to impacted individuals and reviewing its vendor management and data-protection policies to prevent future incidents.

Date Detected: 2025-08-23

Type: ransomware

Attack Vector: third-party vendor compromise

Motivation: financial (presumed, based on ransomware attack)

Incident : data breach

Title: Volvo North America Data Breach Following Ransomware Attack on IT Provider Miljödata

Description: Volvo North America disclosed a data breach exposing the personal data of its employees after a ransomware attack on third-party supplier Miljödata. The attack, claimed by the ransomware group DataCarry, impacted at least 25 companies, including Volvo, Scandinavian airline SAS, Boliden, and 200 Swedish municipalities. The compromised systems handled HR-related data such as medical certificates, rehabilitation matters, and work-related injuries. Leaked data included names, Social Security numbers, email addresses, physical addresses, phone numbers, government IDs, dates of birth, and gender, affecting 870,000 accounts. Volvo offered 18 months of free identity protection and credit monitoring to affected individuals.

Date Detected: 2025-08-23

Date Publicly Disclosed: 2025-09-25

Type: data breach

Attack Vector: ransomware

Threat Actor: DataCarry (ransomware group)

Motivation: financial (ransomware)

Incident : ransomware

Title: Ransomware Attack on Miljödata Affecting Volvo North America and Other Organizations

Description: Volvo North America announced that attackers accessed employee data after a ransomware attack struck its HR system provider, Miljödata. The DataCarry ransomware group claimed responsibility for the attack on Miljödata's Adato system, which manages workers' sick leave and rehabilitation. The breach exposed names and Social Security Numbers (SSNs) of Volvo employees, among other data types for other affected organizations. The attack disrupted public services across 200 Swedish municipalities and impacted multiple universities and companies, including Swedish airline SAS. Approximately 1.5 million people were affected overall.

Date Detected: 2023-08-23

Date Publicly Disclosed: 2023-09-02

Type: ransomware

Attack Vector: Exploitation of vulnerabilities in Miljödata's Adato system (cloud-hosted environment)

Threat Actor: DataCarry ransomware group

Motivation: Financial gain (ransomware), data exfiltration for potential sale on dark web

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach VOL14329322

Data Compromised: R&d data

Incident : Data Exposure VOL12021023

Data Compromised: Database authentication information, Private user data

Systems Affected: MySQL DatabasesRedis Databases

Incident : data breach VOL2832328091725

Data Compromised: Noms, Adresses, Coordonnées (employés et citoyens), Données d'entreprises (volvo, sas)

Brand Reputation Impact: high (affecting 15% of Sweden's population and major companies)

Identity Theft Risk: high

Incident : ransomware VOL5192851092525

Data Compromised: First names, Last names, Social security numbers

Systems Affected: Miljödata's HR management systems

Downtime: 2025-08-20 to at least 2025-09-02 (ongoing investigation)

Operational Impact: disruption of HR services for Volvo Group's North American workforce

Brand Reputation Impact: potential reputational harm due to third-party breach and exposure of sensitive employee data

Identity Theft Risk: elevated (due to exposure of Social Security numbers)

Payment Information Risk: none (no payroll, bank account, or insurance details accessed)

Incident : data breach VOL2892928092525

Data Compromised: Names, Social security numbers, Email addresses, Physical addresses, Phone numbers, Government ids, Dates of birth, Gender

Systems Affected: HR software systems (medical certificates, rehabilitation matters, work-related injury reporting)

Operational Impact: Disruption to HR and managerial processes for handling employee data

Brand Reputation Impact: Potential reputational damage due to exposure of sensitive employee data

Identity Theft Risk: High (due to exposure of PII including SSNs and government IDs)

Incident : ransomware VOL2792427092625

Data Compromised: First and last names, Social security numbers (ssns), Phone numbers, Home addresses, Genders, Email addresses, Dates of birth, Sick leave information, Employee accounts, Employment information (e.g., role, tenure), Workplace incident reports

Systems Affected: Miljödata's Adato system (cloud-hosted)production environment for workplace incident reporting/monitoring

Downtime: Disrupted public services across 200 Swedish municipalities (since August 20, 2023)

Operational Impact: Disruption of HR and sick leave management systems, public service interruptions, potential delays in workplace rehabilitation processes

Brand Reputation Impact: High (large-scale breach affecting 1.5 million individuals, including employees of major organizations like Volvo and SAS)

Legal Liabilities: Potential regulatory fines under GDPR or other data protection laws; class-action lawsuits from affected individuals

Identity Theft Risk: High (SSNs and other PII exposed)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are R&D Data, , Database Authentication Information, Private User Data, , Personally Identifiable Information (Pii), Employee Data, Corporate Data, , Personally Identifiable Information (Pii), , Personally Identifiable Information (Pii), Employee Records, , Personally Identifiable Information (Pii), Employee Records, Workplace Incident Reports and .

Which entities were affected by each incident ?

Incident : Data Breach VOL14329322

Entity Name: Volvo

Entity Type: Company

Industry: Automotive

Incident : Data Exposure VOL12021023

Entity Name: Dimas Volvo

Entity Type: Retail

Industry: Automotive

Location: Brazil

Incident : data breach VOL2832328091725

Entity Name: Communes suédoises

Entity Type: government (local)

Industry: public administration

Location: Sweden

Customers Affected: 1,500,000+ (citizens and employees)

Incident : data breach VOL2832328091725

Entity Name: Administrations régionales suédoises

Entity Type: government (regional)

Industry: public administration

Location: Sweden

Customers Affected: 1,500,000+ (citizens and employees)

Incident : data breach VOL2832328091725

Entity Name: Volvo

Entity Type: private company

Industry: automotive

Location: Sweden

Incident : data breach VOL2832328091725

Entity Name: SAS (Scandinavian Airlines)

Entity Type: private company

Industry: aviation

Location: Sweden

Incident : ransomware VOL5192851092525

Entity Name: Volvo Group

Entity Type: corporation

Industry: automotive/manufacturing

Location: North America (workforce affected)

Customers Affected: 0 (employees affected)

Incident : ransomware VOL5192851092525

Entity Name: Miljödata

Entity Type: third-party vendor

Industry: HR software/services

Incident : data breach VOL2892928092525

Entity Name: Volvo Group North America

Entity Type: automotive manufacturer

Industry: automotive

Location: North America

Customers Affected: employees (870,000 records exposed)

Incident : data breach VOL2892928092525

Entity Name: Miljödata

Entity Type: IT service provider

Industry: technology/HR software

Location: Sweden

Customers Affected: 25+ companies (including SAS, Boliden, 200 Swedish municipalities)

Incident : data breach VOL2892928092525

Entity Name: Scandinavian Airlines (SAS)

Entity Type: airline

Industry: aviation

Location: Scandinavia

Incident : data breach VOL2892928092525

Entity Name: Boliden

Entity Type: mining company

Industry: mining

Location: Sweden

Incident : data breach VOL2892928092525

Entity Name: 200 Swedish municipalities

Entity Type: government entities

Industry: public sector

Location: Sweden

Incident : ransomware VOL2792427092625

Entity Name: Volvo North America

Entity Type: Private (Automotive Manufacturer)

Industry: Automotive

Location: North America (headquartered in Sweden)

Size: Large

Incident : ransomware VOL2792427092625

Entity Name: Miljödata

Entity Type: Private (Software Provider)

Industry: HR/Software Services

Location: Sweden

Customers Affected: 1.5 million individuals (including employees of client organizations)

Incident : ransomware VOL2792427092625

Entity Name: Swedish Airline (SAS)

Entity Type: Private (Airline)

Industry: Aviation

Location: Sweden

Size: Large

Customers Affected: Current and former employees (joined before June 21, 2021)

Incident : ransomware VOL2792427092625

Entity Name: City of Stockholm

Entity Type: Public (Municipality)

Industry: Government

Location: Stockholm, Sweden

Customers Affected: Employees (data from workplace incident reporting system)

Incident : ransomware VOL2792427092625

Entity Name: Chalmers University of Technology

Entity Type: Public (Educational Institution)

Industry: Education

Location: Sweden

Incident : ransomware VOL2792427092625

Entity Name: Karlstad University

Entity Type: Public (Educational Institution)

Industry: Education

Location: Sweden

Incident : ransomware VOL2792427092625

Entity Name: Örebro University

Entity Type: Public (Educational Institution)

Industry: Education

Location: Sweden

Incident : ransomware VOL2792427092625

Entity Name: Lunds University

Entity Type: Public (Educational Institution)

Industry: Education

Location: Sweden

Incident : ransomware VOL2792427092625

Entity Name: Linköping University

Entity Type: Public (Educational Institution)

Industry: Education

Location: Sweden

Incident : ransomware VOL2792427092625

Entity Name: Umeå University

Entity Type: Public (Educational Institution)

Industry: Education

Location: Sweden

Incident : ransomware VOL2792427092625

Entity Name: Swedish University of Agricultural Sciences

Entity Type: Public (Educational Institution)

Industry: Education/Agriculture

Location: Sweden

Incident : ransomware VOL2792427092625

Entity Name: 200 Swedish Municipalities

Entity Type: Public (Local Governments)

Industry: Government

Location: Sweden

Customers Affected: Public service disruptions

Response to the Incidents

What measures were taken in response to each incident ?

Incident : data breach VOL2832328091725

Incident : ransomware VOL5192851092525

Incident Response Plan Activated: yes (by Miljödata on 2025-08-23)

Third Party Assistance: external cybersecurity experts engaged by Miljödata for forensic investigation

Containment Measures: isolation of affected systemsnotification to Volvo Group

Remediation Measures: enhancement of Miljödata's hosted environment security

Communication Strategy: notification to affected employees via email and postal mailprovision of identity protection services (Allstate Identity Protection Pro+)guidance from Volvo Group's People Services team

Enhanced Monitoring: yes (implemented by Miljödata post-incident)

Incident : data breach VOL2892928092525

Incident Response Plan Activated: True

Third Party Assistance: Cybersecurity Experts (Unspecified).

Containment Measures: enhanced security of hosted environment

Recovery Measures: preventive measures to avoid future breaches

Communication Strategy: data breach notification letters to affected individualspublic disclosure via Massachusetts AGoffer of 18-month identity protection (Allstate’s Identity Protection Pro+)

Incident : ransomware VOL2792427092625

Incident Response Plan Activated: Yes (Miljödata commenced investigation on August 23, 2023)

Third Party Assistance: Yes (cybersecurity experts engaged by Miljödata)

Law Enforcement Notified: Yes (investigation led by Swedish prosecutor Sandra Helgadottir)

Containment Measures: Isolation of affected systemsEnhanced security of Miljödata-hosted environment

Remediation Measures: Review of security policies, procedures, and toolsSteps to prevent recurrence of similar incidents

Communication Strategy: Disclosure to affected organizations (e.g., Volvo, SAS)Public filings (e.g., Massachusetts Attorney General's office)Media statements

Enhanced Monitoring: Yes (implemented by Miljödata)

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes (Miljödata commenced investigation on August 23, 2023).

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through external cybersecurity experts engaged by Miljödata for forensic investigation, cybersecurity experts (unspecified), , Yes (cybersecurity experts engaged by Miljödata).

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach VOL14329322

Type of Data Compromised: R&d data

Sensitivity of Data: High

Incident : Data Exposure VOL12021023

Type of Data Compromised: Database authentication information, Private user data

Incident : data breach VOL2832328091725

Type of Data Compromised: Personally identifiable information (pii), Employee data, Corporate data

Number of Records Exposed: 1,500,000+

Sensitivity of Data: high

Incident : ransomware VOL5192851092525

Type of Data Compromised: Personally identifiable information (pii)

Sensitivity of Data: high (includes Social Security numbers)

Data Exfiltration: presumed (based on ransomware attack and data exposure)

Data Encryption: yes (systems encrypted by ransomware)

Personally Identifiable Information: full namesSocial Security numbers

Incident : data breach VOL2892928092525

Type of Data Compromised: Personally identifiable information (pii), Employee records

Number of Records Exposed: 870,000

Sensitivity of Data: high (includes SSNs, government IDs, dates of birth)

File Types Exposed: HR databasesemployee records

Personally Identifiable Information: namesemail addressesphysical addressesphone numbersgovernment IDsdates of birthgenderSocial Security numbers

Incident : ransomware VOL2792427092625

Type of Data Compromised: Personally identifiable information (pii), Employee records, Workplace incident reports

Number of Records Exposed: 1,500,000 (individuals); 870,000 unique email addresses (per HaveIBeenPwned)

Sensitivity of Data: High (includes SSNs, employment details, sick leave information)

Data Exfiltration: Yes (data available for download on DataCarry's dark web site)

Data Encryption: Yes (ransomware encryption of Miljödata's systems)

File Types Exposed: HR recordsemployee databasesworkplace incident reports

Personally Identifiable Information: full namesSocial Security Numbers (SSNs)phone numbershome addressesgendersemail addressesdates of birth

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: enhancement of Miljödata's hosted environment security, , Review of security policies, procedures, and tools, Steps to prevent recurrence of similar incidents, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by isolation of affected systems, notification to volvo group, , enhanced security of hosted environment, , isolation of affected systems, enhanced security of miljödata-hosted environment and .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Breach VOL14329322

Ransomware Strain: Snatch

Data Exfiltration: True

Incident : data breach VOL2832328091725

Ransom Demanded: 1.5 BTC (≈ 147,000 EUR)

Data Exfiltration: True

Incident : ransomware VOL5192851092525

Data Encryption: yes

Data Exfiltration: unconfirmed (potential exposure of PII)

Incident : data breach VOL2892928092525

Data Encryption: True

Data Exfiltration: True

Incident : ransomware VOL2792427092625

Ransomware Strain: DataCarry

Data Encryption: Yes

Data Exfiltration: Yes

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through preventive measures to avoid future breaches, .

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : data breach VOL2892928092525

Regulatory Notifications: Massachusetts Attorney General

Incident : ransomware VOL2792427092625

Regulations Violated: Potential GDPR violations (EU General Data Protection Regulation),

Legal Actions: Investigation led by Swedish prosecutor Sandra Helgadottir,

Regulatory Notifications: Massachusetts Attorney General's office (disclosure filed by Volvo)

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Investigation led by Swedish prosecutor Sandra Helgadottir, .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : ransomware VOL5192851092525

Lessons Learned: importance of third-party vendor security oversight, need for robust vendor management and data-protection policies, proactive measures (e.g., identity protection services) to mitigate harm from breaches

What recommendations were made to prevent future incidents ?

Incident : ransomware VOL5192851092525

Recommendations: enhance third-party risk assessments and continuous monitoring, implement stricter contractual security requirements for vendors, expand employee training on recognizing and responding to identity theft risks, consider multi-factor authentication (MFA) and encryption for sensitive data shared with vendorsenhance third-party risk assessments and continuous monitoring, implement stricter contractual security requirements for vendors, expand employee training on recognizing and responding to identity theft risks, consider multi-factor authentication (MFA) and encryption for sensitive data shared with vendorsenhance third-party risk assessments and continuous monitoring, implement stricter contractual security requirements for vendors, expand employee training on recognizing and responding to identity theft risks, consider multi-factor authentication (MFA) and encryption for sensitive data shared with vendorsenhance third-party risk assessments and continuous monitoring, implement stricter contractual security requirements for vendors, expand employee training on recognizing and responding to identity theft risks, consider multi-factor authentication (MFA) and encryption for sensitive data shared with vendors

Incident : data breach VOL2892928092525

Recommendations: Monitor account statements and credit reports regularly, Enhance third-party vendor security assessments, Implement robust data protection measures for HR systemsMonitor account statements and credit reports regularly, Enhance third-party vendor security assessments, Implement robust data protection measures for HR systemsMonitor account statements and credit reports regularly, Enhance third-party vendor security assessments, Implement robust data protection measures for HR systems

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are importance of third-party vendor security oversight,need for robust vendor management and data-protection policies,proactive measures (e.g., identity protection services) to mitigate harm from breaches.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: implement stricter contractual security requirements for vendors, consider multi-factor authentication (MFA) and encryption for sensitive data shared with vendors, enhance third-party risk assessments and continuous monitoring and expand employee training on recognizing and responding to identity theft risks.

References

Where can I find more information about each incident ?

Incident : Data Exposure VOL12021023

Source: Cybernews

Incident : data breach VOL2832328091725

Source: Swedish Prosecution Authority (media reports)

Incident : ransomware VOL5192851092525

Source: GBHackers (GBH)

Incident : data breach VOL2892928092525

Source: SecurityAffairs

Date Accessed: 2025-09-25

Incident : data breach VOL2892928092525

Source: Have I Been Pwned (HIBP)

Date Accessed: 2025-09-25

Incident : data breach VOL2892928092525

Source: Volvo Group North America data breach notification letter

Date Accessed: 2025-09-02

Incident : ransomware VOL2792427092625

Source: The Register

Incident : ransomware VOL2792427092625

Source: Massachusetts Attorney General's Office (Disclosure PDF by Volvo)

Incident : ransomware VOL2792427092625

Source: Sweden Herald (Interview with Prosecutor Sandra Helgadottir)

Incident : ransomware VOL2792427092625

Source: HaveIBeenPwned

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cybernews, and Source: Swedish Prosecution Authority (media reports), and Source: GBHackers (GBH), and Source: SecurityAffairsDate Accessed: 2025-09-25, and Source: Have I Been Pwned (HIBP)Date Accessed: 2025-09-25, and Source: Volvo Group North America data breach notification letterDate Accessed: 2025-09-02, and Source: The Register, and Source: Massachusetts Attorney General's Office (Disclosure PDF by Volvo), and Source: Sweden Herald (Interview with Prosecutor Sandra Helgadottir), and Source: HaveIBeenPwned.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : data breach VOL2832328091725

Investigation Status: ongoing (no evidence of foreign state involvement)

Incident : ransomware VOL5192851092525

Investigation Status: ongoing (as of 2025-09-02, validating full extent of exposure)

Incident : data breach VOL2892928092525

Investigation Status: Ongoing (as of 2025-09-25)

Incident : ransomware VOL2792427092625

Investigation Status: Ongoing (as of September 2023, led by Swedish authorities and Miljödata)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification To Affected Employees Via Email And Postal Mail, Provision Of Identity Protection Services (Allstate Identity Protection Pro+), Guidance From Volvo Group'S People Services Team, Data Breach Notification Letters To Affected Individuals, Public Disclosure Via Massachusetts Ag, Offer Of 18-Month Identity Protection (Allstate’S Identity Protection Pro+), Disclosure To Affected Organizations (E.G., Volvo, Sas), Public Filings (E.G., Massachusetts Attorney General'S Office) and Media Statements.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : ransomware VOL5192851092525

Stakeholder Advisories: Volvo Group'S People Services Team Available For Employee Support, Identity Protection Services (Allstate Identity Protection Pro+) Offered To Affected Employees.

Customer Advisories: employees advised to monitor bank/credit card statements for suspicious activityrecommendation to obtain free annual credit reports and place fraud alerts/security freezesenrollment instructions for identity protection services to be sent via email and postal mail

Incident : data breach VOL2892928092525

Stakeholder Advisories: Notification To Massachusetts Ag, Internal Communication To Affected Employees.

Customer Advisories: 18-month complimentary identity protection (Allstate’s Identity Protection Pro+)

Incident : ransomware VOL2792427092625

Stakeholder Advisories: Volvo Notified Affected Employees, Sas Notified Current/Former Employees (Joined Before June 21, 2021), City Of Stockholm Notified Employees.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Volvo Group'S People Services Team Available For Employee Support, Identity Protection Services (Allstate Identity Protection Pro+) Offered To Affected Employees, Employees Advised To Monitor Bank/Credit Card Statements For Suspicious Activity, Recommendation To Obtain Free Annual Credit Reports And Place Fraud Alerts/Security Freezes, Enrollment Instructions For Identity Protection Services To Be Sent Via Email And Postal Mail, , Notification To Massachusetts Ag, Internal Communication To Affected Employees, 18-Month Complimentary Identity Protection (Allstate’S Identity Protection Pro+), , Volvo Notified Affected Employees, Sas Notified Current/Former Employees (Joined Before June 21, 2021) and City Of Stockholm Notified Employees.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : data breach VOL2832328091725

High Value Targets: Government Databases, Corporate Data (Volvo, Sas),

Data Sold on Dark Web: Government Databases, Corporate Data (Volvo, Sas),

Incident : ransomware VOL5192851092525

High Value Targets: Hr Management Systems (Miljödata),

Data Sold on Dark Web: Hr Management Systems (Miljödata),

Incident : data breach VOL2892928092525

High Value Targets: Hr Systems, Employee Pii Databases,

Data Sold on Dark Web: Hr Systems, Employee Pii Databases,

Incident : ransomware VOL2792427092625

High Value Targets: Adato System (Hr/Sick Leave Management), Employee Databases, Workplace Incident Reporting Systems,

Data Sold on Dark Web: Adato System (Hr/Sick Leave Management), Employee Databases, Workplace Incident Reporting Systems,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : ransomware VOL5192851092525

Root Causes: Third-Party Vendor (Miljödata) Security Vulnerabilities, Delayed Detection Of Suspicious Activity (3 Days Post-Attack),

Corrective Actions: Miljödata: Forensic Investigation And Security Enhancements, Volvo Group: Review Of Vendor Management And Data-Protection Policies,

Incident : data breach VOL2892928092525

Corrective Actions: Enhanced Security Of Hosted Environment, Preventive Measures For Future Breaches,

Incident : ransomware VOL2792427092625

Root Causes: Vulnerabilities In Miljödata'S Cloud-Hosted Adato System, Inadequate Security Measures To Prevent Ransomware Intrusion,

Corrective Actions: Enhanced Security Of Miljödata-Hosted Environment, Review Of Security Policies/Procedures/Tools, Preventive Measures To Avoid Recurrence,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as external cybersecurity experts engaged by Miljödata for forensic investigation, yes (implemented by Miljödata post-incident), Cybersecurity Experts (Unspecified), , , , Yes (implemented by Miljödata).

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Miljödata: Forensic Investigation And Security Enhancements, Volvo Group: Review Of Vendor Management And Data-Protection Policies, , Enhanced Security Of Hosted Environment, Preventive Measures For Future Breaches, , Enhanced Security Of Miljödata-Hosted Environment, Review Of Security Policies/Procedures/Tools, Preventive Measures To Avoid Recurrence, .

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was 1.5 BTC (≈ 147,000 EUR).

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Snatch, Datacarry, DataCarry (ransomware group) and DataCarry ransomware group.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on December 2021.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-09-02.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were R&D Data, , Database Authentication Information, Private User Data, , noms, adresses, coordonnées (employés et citoyens), données d'entreprises (Volvo, SAS), , first names, last names, Social Security numbers, , names, Social Security numbers, email addresses, physical addresses, phone numbers, government IDs, dates of birth, gender, , first and last names, Social Security Numbers (SSNs), phone numbers, home addresses, genders, email addresses, dates of birth, sick leave information, employee accounts, employment information (e.g., role, tenure), workplace incident reports and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident were MySQL DatabasesRedis Databases and Miljödata's HR management systems and HR software systems (medical certificates, rehabilitation matters, work-related injury reporting) and Miljödata's Adato system (cloud-hosted)production environment for workplace incident reporting/monitoring.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was external cybersecurity experts engaged by Miljödata for forensic investigation, cybersecurity experts (unspecified), , .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were isolation of affected systemsnotification to Volvo Group, enhanced security of hosted environment and Isolation of affected systemsEnhanced security of Miljödata-hosted environment.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, R&D Data, noms, adresses, données d'entreprises (Volvo, SAS), Social Security Numbers (SSNs), first names, phone numbers, last names, Database Authentication Information, first and last names, gender, dates of birth, employment information (e.g., role, tenure), sick leave information, names, employee accounts, Private User Data, coordonnées (employés et citoyens), home addresses, physical addresses, genders, workplace incident reports, government IDs and email addresses.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 4.7M.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 1.5 BTC (≈ 147,000 EUR).

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Investigation led by Swedish prosecutor Sandra Helgadottir, .

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was proactive measures (e.g., identity protection services) to mitigate harm from breaches.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was enhance third-party risk assessments and continuous monitoring, expand employee training on recognizing and responding to identity theft risks, implement stricter contractual security requirements for vendors, Enhance third-party vendor security assessments, Implement robust data protection measures for HR systems, consider multi-factor authentication (MFA) and encryption for sensitive data shared with vendors and Monitor account statements and credit reports regularly.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are GBHackers (GBH), SecurityAffairs, Have I Been Pwned (HIBP), Cybernews, Sweden Herald (Interview with Prosecutor Sandra Helgadottir), The Register, Volvo Group North America data breach notification letter, Swedish Prosecution Authority (media reports), Massachusetts Attorney General's Office (Disclosure PDF by Volvo) and HaveIBeenPwned.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (no evidence of foreign state involvement).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Volvo Group's People Services team available for employee support, identity protection services (Allstate Identity Protection Pro+) offered to affected employees, Notification to Massachusetts AG, Internal communication to affected employees, Volvo notified affected employees, SAS notified current/former employees (joined before June 21, 2021), City of Stockholm notified employees, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an employees advised to monitor bank/credit card statements for suspicious activityrecommendation to obtain free annual credit reports and place fraud alerts/security freezesenrollment instructions for identity protection services to be sent via email and postal mail and 18-month complimentary identity protection (Allstate’s Identity Protection Pro+).

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was third-party vendor (Miljödata) security vulnerabilitiesdelayed detection of suspicious activity (3 days post-attack), Vulnerabilities in Miljödata's cloud-hosted Adato systemInadequate security measures to prevent ransomware intrusion.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Miljödata: forensic investigation and security enhancementsVolvo Group: review of vendor management and data-protection policies, Enhanced security of hosted environmentPreventive measures for future breaches, Enhanced security of Miljödata-hosted environmentReview of security policies/procedures/toolsPreventive measures to avoid recurrence.

cve

Latest Global CVEs (Not Company-Specific)

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.

Risk Information
cvss3
Base: 9.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Description

Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Description

Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.

Risk Information
cvss3
Base: 8.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L
Description

The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Risk Information
cvss3
Base: 5.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=volvo-group' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge