The infamous Everest ransomware group has reportedly included Bayerische Motoren Werke AG (BMW) as a high-profile target, claiming the theft of a significant amount of critical internal documents from the German automotive manufacturer.
According to information surfaced, Everest claims to have exfiltrated a staggering 600,000 lines of sensitive internal data from BMW, now using the threat of public exposure as leverage for ransom negotiations.
Everest, known for targeting organizations across multiple sectors, displayed BMW on its leak site alongside a countdown timer indicating the limited window available for negotiations before confidential files are released to the public.
The site features sections titled “Critical BMW Audit Documents” and urgent instructions for BMW representatives, stressing the urgency by listing time-sensitive deadlines for accessing the stolen materials.

The prominent inclusion of BMW on the Everest portal has already drawn widespread attention within both cybersecurity and automotive communities.
The gang is leveraging intimidation tactics, stating that the “recording will be available through” a countdown clock, a common method used by ransomware operators to pressure victim organizations into meeting their demands swiftly.
The evidence provided by the Everest group reportedly includes references to internal audit files and communications, but the authenticity and full scope of the stolen documents have not yet been independently verified.
The alleged data haul of 600,000 lines signals a significant compromise, potentially exposing financial records, audit reports, engineering documentation, and other confidential corporate information.
Threat analysts monitoring the situation caution that the leak could not only affect BMW’s internal operations but also pose broader risks to partners, suppliers, and customers if sensitive data is published or sold on underground forums.
Ransomware attacks targeting the automotive sector have escalated in 2025, reflecting adversaries’ growing interest in complex supply chains and high-value intellectual property.
BMW has yet to release an official statement regarding the incident, and it remains unclear whether the company has entered negotiations with Everest or informed regulatory authorities about the alleged breach.
Security experts urge companies to avoid direct ransom payments, work closely with law enforcement, and prioritize proactive vulnerability management.
The Everest ransomware group’s claim against BMW, if substantiated, marks another troubling milestone in the ongoing battle against cyber extortion.
As investigations continue, industry observers await further confirmation of the breach’s impact and potential mitigation steps taken by the automotive giant.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
Source link