Thousands of business users across Europe and Australia
Autovista, a major provider of automotive data and analytics services, has been impacted by a Ransomware attack, leading to widespread service disruptions. The London-based company, which was acquired by JD Power in 2024, provides critical valuation and market intelligence applications to the automotive industry. The attack has affected systems and services in Europe and Australia. Autovista has acknowledged the incident and is working with third-party experts to contain the threat and restore operations. The identity of the ransomware group and the initial attack vector have not yet been disclosed. This incident highlights the continued targeting of critical B2B service providers by ransomware gangs.
On April 15, 2026, Autovista issued a public statement confirming it was the target of a ransomware attack. The attack has disrupted the company's suite of applications, which are essential for clients such as car manufacturers, dealerships, insurance companies, and body shops for vehicle valuation, trend monitoring, and cost-of-ownership calculations. The disruption affects operations across Europe and Australia, impacting brands under the Autovista umbrella including Eurotax, Glass's, Rødboka, and Schwacke. The company has not confirmed if data was exfiltrated in addition to being encrypted, which is a common tactic in modern ransomware attacks (T1048).
Details on the technical specifics of the attack are scarce as the investigation is ongoing. However, the incident follows the typical ransomware attack pattern:
T1566), exploitation of public-facing vulnerabilities (T1190), or compromised credentials.T1486), causing the service disruption. It is highly probable that data was also exfiltrated prior to encryption for double extortion.As of now, no specific ransomware group has publicly claimed responsibility for the attack on their data leak sites.
The impact on Autovista's clients is significant, as their daily operations rely on the availability of its data and applications for pricing, sales, and insurance underwriting. This can lead to direct financial losses and operational delays for thousands of businesses in the automotive sector. For Autovista, the incident carries severe reputational damage, potential regulatory fines if personal data was compromised, and substantial costs associated with incident response, remediation, and service restoration.
No Indicators of Compromise (IOCs) have been released at this time.
Organizations can improve their defenses against similar ransomware attacks by focusing on:
vssadmin.exe delete shadows), and attempts to disable security software (T1562.001). (D3-PA: Process Analysis)Segmenting networks can contain the spread of ransomware, preventing it from reaching critical assets from an initial point of compromise.
Mapped D3FEND Techniques:
Enforcing MFA on all remote access services and critical systems makes it significantly harder for attackers to use stolen credentials for initial access or lateral movement.
Mapped D3FEND Techniques:
Training users to identify and report phishing attempts can prevent initial access, which is a primary vector for ransomware attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats