Formula 1 team Marussia has admitted that its IT systems were infected by a Trojan during testing for the forthcoming racing season earlier this week.
The incident was reported by the firm during an interview with racing website Autosport, as team principal John Booth explained. "It started off with the first disaster, which was a computer Trojan-type virus in the racks, which cost us the best part of the day," he said.
Booth did not elaborate on the nature of the attack or the specific issues it caused, but the fact it cost the team almost an entire day of testing and data suggests it was a serious incident.
V3 contacted Marussia for more information but had received no reply at the time of publication.
Nonetheless, the incident underlines the threats facing firms in all areas of business, from banking to motorsport, as criminals see benefits in stealing data from major organisations.
Alan Neville on the Security Response Team at Symantec told V3 the attack underlined the threats that all firms face.
“You can’t assume you won’t be a target. Just because you’re an SMB for example, you need to take preventative measures because regardless of size or sector you can be hit,” he said.
“You always need to be aware of the type of attacks that can occur.”
The risks of unintentional infections is also high, as complex Trojans and malware spread beyond their original targets and new IT trends such as cloud computing and bring your own device pose new risks.
IT within the F1 community is increasingly important as firms not only have to gather huge amounts of data on their cars, which is crucial to performance, but teams also have to battle with ever-changing rules and regulations, as Lotus explained last year.
F1 champions Infiniti Red Bull Racing explained to V3 last year that security and data thefts are two of the biggest challenges it faces as it strives for racing glory.
Claims to have "the most competitive logic density" in the industry
Dell's high-end mobile workstations upgraded with Intel Coffee Lake CPUs
Webstresser admins were also arrested in the UK, Croatia, Canada and Serbia
Security firm claims that 117,638 sites out of 135,035 analysed contain serious security flaws