Connect with us

Hi, what are you looking for?



Operations, Trading of Eagers Automotive Disrupted by Cyberattack

Eagers Automotive, a vehicle dealer in Australia and New Zealand, has halted trading after being targeted in a cyberattack.

Eagers Automotive (ASX: APE), a vehicle dealer in Australia and New Zealand, announced this week that some of its operations have been disrupted as a result of a cyberattack that forced the company to halt trading on the Australian Securities Exchange. 

The company announced a pause in trading on December 27 and revealed the next day that the cause was a cybersecurity incident that resulted in an outage of certain IT systems at some operational locations across Australia and New Zealand.

Eagers Automotive said a majority of dealerships remain open and continue to trade, with the incident mainly impacting the company’s ability to finalize transactions for new vehicles that have already been sold and are ready for delivery. Service and parts operations have also been impacted to a certain extent.

“The financial impact of the cyber incident for the year ending 31 December 2023 is expected to primarily relate to the deferral in the recognition of some transactions across the last 5 days of December 2023,” the company stated.

It added, “Although the company’s Statutory Profit Before Tax for the 2023 financial year will be impacted by the cyber incident, predominantly as a result of the deferred sales, the impact is not expected to be material.”

Eagers Automotive is now trying to determine whether any personal information has been compromised as a result of the incident. The car dealer has promised to notify affected individuals if it discovers a data breach. 

Eagers Automotive has not shared any information on the attack itself, but, based on its brief description, it may have been a ransomware incident. However, no known ransomware group appears to have taken credit for the attack as of December 29.

Related: Ransomware Group Claims 100 Gb of Data Stolen From Nissan

Advertisement. Scroll to continue reading.

Related: UK Car Retailer Arnold Clark Hit by Ransomware

Related: Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.