author photo
By Cam Sivesind
Wed | Jun 26, 2024 | 1:30 PM PDT

CDK Global, a leading provider of software-as-a-service (SaaS) solutions for the automotive industry, recently fell victim to a significant data breach. The incident is affecting thousands of car dealerships and potentially millions of consumers.

CDK Global, which provides crucial services such as financing, payroll, and other operational functions to more than 15,000 car dealerships worldwide, discovered unauthorized access to its systems. While the full extent of the breach is still being investigated, the company has confirmed that sensitive data was compromised.

The immediate fallout for CDK Global has been severe:

  1. Stock price volatility – Following the announcement, CDK Global's stock price experienced significant fluctuations as investors reacted to the news.
  2. Reputational damage – As a company that prides itself on providing secure, reliable services, this breach has dealt a blow to CDK Global's reputation.
  3. Potential legal consequences – The company may face lawsuits from affected dealerships and consumers, as well as potential regulatory fines for data protection violations.
  4. Operational disruptions – CDK Global has had to divert significant resources to address the breach, potentially affecting its ability to maintain normal operations.

Impact on auto manufacturers and dealerships

The ripple effects of this breach extend far beyond CDK Global itself, including:

  1. Data exposure – Dealerships using CDK Global's services may have had sensitive customer and operational data exposed, including financial information and personal details.
  2. Operational disruptions – Many dealerships rely heavily on CDK Global's software for day-to-day operations. Any downtime or service interruptions could significantly impact their ability to conduct business. On Monday, the Associated Press reported that the CDK hack affected dealers for Stellantis, Ford, and BMW. Stellantis specifically told AP that some of its dealerships had reverted to pen-and-paper record keeping to keep sales going. Ford and Lincoln customers had to resort to other means to access sales and service support. Penske Automotive Group reported to Bleeping Computer that its Premier Truck Group business suffered disruptions.
  3. Customer trust – Car buyers may be hesitant to share personal information with dealerships knowing that their data could be vulnerable.
  4. Potential financial losses – Dealerships may face financial repercussions if customer data was compromised, including potential compensation payouts and lost business.
  5. Supply chain concerns – Auto manufacturers may need to reassess their relationships with service providers and implement more stringent vetting processes.

"Interestingly, last week I was at an Audi dealership when this breach occurred. The dealership was unable to perform any maintenance on my vehicle's software, such as checking for bugs or performing software updates, because their system was 'down,'" said Hemanth Tadepalli, Cybersecurity and Compliance Engineer at May Mobility, an autonomous vehicle technology company. "All my requests had to be recorded manually on paper due to the security incident. This experience underscored the significant operational disruptions that such breaches can cause and highlighted the critical need for improved cybersecurity measures."

"Many dealerships rely heavily on CDK Global's software for day-to-day operations," Tadepalli added. "Any downtime or service interruptions can significantly impact their ability to conduct business, leading to potential financial losses and decreased customer satisfaction."

Broader implications for the automotive industry

This breach serves as a wake-up call for the entire automotive industry.

  1. Cybersecurity prioritization – The incident highlights the need for robust cybersecurity measures across the automotive supply chain, from manufacturers to dealerships to service providers.
  2. Third-party risk management (TPRM) – Companies in the automotive sector must reevaluate their third-party risk management strategies, ensuring that their partners and service providers maintain the highest security standards.
  3. Data protection regulations – The breach may prompt calls for stricter data protection regulations specific to the automotive industry.
  4. Consumer awareness – Car buyers are likely to become more conscious of data privacy issues, potentially influencing their purchasing decisions and interactions with dealerships.

"This is a horrendous situation, but it is not unforeseeable. The lesson of the Colonial Pipeline attack was that a successful attack on one major service provider in an industry sector could shut down all organizations relying on its services," said Shawn Tuma, Co-Chair, Data Privacy & Cybersecurity Practice, at Spencer Fane LLP. "In the game of extortion, that's a lot of pressure. We just saw this again with the attack on Change Healthcare which impacted all of the organizations relying on its services. Industry critical service providers have become a very valuable target to threat actors, and we can expect to see these types of attacks impacting similar industry providers in the future. Companies must be asking themselves about what service providers they depend on and how they will continue to operate if something were to happen to them."

May Mobility's Tadepalli offered further perspective:

"Going forward, companies like CDK must collaborate closely with their clients to ensure robust protection is in place. This includes comprehensive security operations, regular security audits, security related town halls with respective clients, and effective risk management strategies," Tadepalli said. "By working together and involving each other in various cybersecurity milestones—such as tabletop exercises and security assessments—these companies can strengthen their security posture and foster stronger relationships."

Tadepalli is speaking at the SecureWorld Detroit conference on September 18, 2024, on Securing Autonomous Vehicles: Unveiling Emerging Threats from Technological Advances and Effective Mitigation Strategies.

"As more companies develop electric vehicles (EVs), connected vehicles, and incorporate autonomous features, the volume of processed and utilized data will increase significantly. It is crucial to ensure this data is secured to protect both the vehicles and their users," Tadepalli said. "From this attack overall, we can say that cybersecurity is no longer just an IT issue but a business imperative that impacts every facet of the organization. This breach serves as a critical wake-up call for the entire automotive industry. It underscores the urgent need for cybersecurity measures across the supply chain, from manufacturers to dealerships to service providers. The industry must take proactive steps to enhance cybersecurity, improve incident response plans, and invest in employee training. Collaborating on industry-wide solutions and developing common security standards are essential to prevent similar incidents in the future."

As the investigation into the CDK Global breach continues, the automotive industry must take proactive steps to prevent similar incidents in the future, including:

  1. Enhance cybersecurity measures – Implement state-of-the-art security technologies and regularly update systems to address emerging threats.
  2. Improve incident response plans – Develop and regularly test comprehensive incident response plans to minimize damage in case of a breach.
  3. Increase transparency – Foster open communication with customers about data protection practices and any potential risks.
  4. Invest in employee training – Ensure that all employees, from dealership staff to executives, are well-versed in cybersecurity best practices.
  5. Collaborate on industry-wide solutions – Work together as an industry to develop common security standards and share threat intelligence.

"The CDK Global attack highlights a critical aspect of modern cybersecurity: the potential for follow-up social engineering tactics. Threat actors frequently exploit the chaos following a breach to further their agenda, often by posing as support representatives to access even more sensitive information," said Guy Rosenthal, Vice President of Product at DoControl.

"The attack was against a core system that acted much like a SaaS solution, so its impact was widespread," Rosental added. "While specifics are sparse about the nature of the attack, the pattern of events suggests a targeted attack. Multiple incidents close together are characteristic of threat actors trying to maximize impact and ransom or data extortion pressure. Understanding the initial breach vector is crucial. Whether it's social engineering, unpatched software, or other vulnerabilities, each potential entry point needs to be scrutinized and fortified."

Comments