Autovista Hit by Ransomware Attack Disrupting European and Australian Operations
Autovista, a London-based automotive data and analytics provider, has confirmed a ransomware attack disrupting its systems across Europe and Australia. The company disclosed the incident on Wednesday, stating that it has engaged external experts to contain and investigate the breach.
The attack has impacted Autovista’s suite of applications, including tools for monitoring vehicle residual values, market trends, and total cost of ownership (TCO) analytics. These services serve manufacturers, dealers, insurers, telematics firms, and professional services companies. While the company’s website remains operational, some customer-facing systems are experiencing outages, and email access for certain staff has been restricted.
Autovista has not yet determined the attack’s root cause but is working with third-party specialists to assess the breach. The company has provided an alternative contact email for urgent customer inquiries and is directing users to its website for updates. No ransomware group has claimed responsibility for the attack.
Acquired by JD Power in 2024, Autovista Group operates multiple brands including Eurotax, Glass’s, Rødboka, and Schwacke all of which have linked to the same security advisory on Autovista’s site. Anonymous sources report that some organizations have advised employees to block Autovista-related emails, sanitize files, and remove associated executables as a precaution. The full extent of the disruption and recovery timeline remains unclear.
Source: https://www.theregister.com/2026/04/15/automotive_data_biz_autovista_ransomware/
Glass's (UK) cybersecurity rating report: https://www.rankiteo.com/company/glass's-information-services
EurotaxGlass's cybersecurity rating report: https://www.rankiteo.com/company/eurotaxglass's
Autovista FI cybersecurity rating report: https://www.rankiteo.com/company/autovistafi
Autovista cybersecurity rating report: https://www.rankiteo.com/company/autovista-group
"id": "GLAEURAUTAUT1776270262",
"linkid": "glass's-information-services, eurotaxglass's, autovistafi, autovista-group",
"type": "Ransomware",
"date": "4/2026",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'customers_affected': 'Manufacturers, dealers, '
'insurers, telematics firms, and '
'professional services companies',
'industry': 'Automotive data and analytics',
'location': 'London, Europe, Australia',
'name': 'Autovista Group',
'type': 'Company'},
{'industry': 'Automotive data and analytics',
'name': 'Eurotax',
'type': 'Brand'},
{'industry': 'Automotive data and analytics',
'name': 'Glass’s',
'type': 'Brand'},
{'industry': 'Automotive data and analytics',
'name': 'Rødboka',
'type': 'Brand'},
{'industry': 'Automotive data and analytics',
'name': 'Schwacke',
'type': 'Brand'}],
'customer_advisories': 'Directing users to its website for updates and '
'provided an alternative contact email for urgent '
'inquiries',
'description': 'Autovista, a London-based automotive data and analytics '
'provider, has confirmed a ransomware attack disrupting its '
'systems across Europe and Australia. The attack has impacted '
'Autovista’s suite of applications, including tools for '
'monitoring vehicle residual values, market trends, and total '
'cost of ownership (TCO) analytics. These services serve '
'manufacturers, dealers, insurers, telematics firms, and '
'professional services companies. While the company’s website '
'remains operational, some customer-facing systems are '
'experiencing outages, and email access for certain staff has '
'been restricted.',
'impact': {'operational_impact': 'Some customer-facing systems are '
'experiencing outages, and email access for '
'certain staff has been restricted',
'systems_affected': 'Autovista’s suite of applications, including '
'tools for monitoring vehicle residual values, '
'market trends, and total cost of ownership '
'(TCO) analytics'},
'investigation_status': 'Ongoing',
'references': [{'source': 'Security advisory on Autovista’s site'}],
'response': {'communication_strategy': 'Provided an alternative contact email '
'for urgent customer inquiries and is '
'directing users to its website for '
'updates',
'third_party_assistance': 'External experts engaged to contain '
'and investigate the breach'},
'stakeholder_advisories': 'Some organizations have advised employees to block '
'Autovista-related emails, sanitize files, and '
'remove associated executables as a precaution',
'title': 'Autovista Hit by Ransomware Attack Disrupting European and '
'Australian Operations',
'type': 'ransomware'}