Security

Cyber-crime

Car dealers stuck in the slow lane after cyber woes at software biz CDK

More customers self-reporting to SEC as disruption carries into second week


The number of US companies filing Form 8-Ks with the Securities and Exchange Commission (SEC) and referencing embattled car dealership software biz CDK is mounting.

Reports filed since Friday all mention the fact that businesses powered by CDK's software are suffering significant disruption.

For those who didn't catch it last week, CDK Global is a bigshot software slinger to nearly 15,000 car dealerships across the US. Its software can support customers with the management of sales, accounting, inventory, communications, and other back-office functions.

With all of those capabilities, you can imagine what happened when CDK was forced to pull some of its key systems offline (twice) last week in relation to what it's calling a "cyber incident."

The number of Form 8-Ks filed since Friday – that's two working days – now stands at four, a number likely to rise as the week goes on. The companies so far include:

Remember, the SEC's Form 8-K is there to inform shareholders of significant events. In cybersecurity, we often associate them with filings alerting the world to data break-ins, but their remit is much broader.

Looking at the four forms, the commonality among them is that CDK's incident has forced affected customers to dust off their incident response playbooks and deploy various mitigation strategies to deal with the disruption.

Some report resorting to pen-and-paper operations and that things are going fine. Others reported more substantial disruption to sales in North America, which would probably continue until the chaos at CDK is over with.

The timeline for recovery is up for debate, but various sources of information suggest the recovery will be sooner rather than later. However, not everyone is likely to agree with the means of getting there.

According to Group 1 Automotive's filing, CDK told customers that recovery will be a matter of days rather than weeks, which will doubtless be welcome news to those experiencing a greater degree of business disruption than others.

There are also reports from Bloomberg's moles that CDK is strongly considering paying a ransom, and that the group responsible for the attack is an Eastern European cybercrime gang. That ransom is rumored to be in the region of tens of millions of dollars – nothing more specific than that.

El Reg asked CDK about the veracity of these claims made in wider reports, and until we hear back from it on that, all we can go on is the last statement it sent over on June 20.

"Late in the evening of June 19, we experienced an additional cyber incident and proactively shut down most of our systems," said CDK spokesperson Lisa Finney.

"In partnership with third-party experts, we are assessing the impact and providing regular updates to our customers. We remain vigilant in our efforts to reinstate our services and get our dealers back to business as usual as quickly as possible." ®

Send us news
2 Comments

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer

110K domains targeted in 'sophisticated' AWS cloud extortion campaign

If you needed yet another reminder of what happens when security basics go awry

National Public Data tells officials 'only' 1.3M people affected by intrusion

Investigators previously said the number was much, much higher

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

UK trio pleads guilty to running $10M MFA bypass biz

Crew bragged they could help crooks raid victims' bank accounts

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised