Email: contact@nordcs.de
Phone: +49 176 240 73665
Address: Madrider Str. 7, 60327 Frankfurt a. Main, Germany
latest news
Why is it important to identify attack vectors?
As the automotive industry becomes more connected and digitized — and automotive companies open new revenue streams as a result — the attack vectors are evolving beyond traditional stakeholders. According to the report, the top cyberattacks vectors in 2022 were telematics and application servers (35%), remote keyless entry systems (18%), electronic control units (14%), automotive and smart mobility APIs (12%), infotainment systems (8%), mobile applications (6%), and EV charging infrastructure (4%).
Additionally, Attacks are increasingly getting more sophisticated, as the automotive industry continues to change and grow, so does cybercrime. In fact, cyberattacks are becoming even more refined to match the evolution in the industry. For starters, nearly all attacks (97%) are being conducted remotely, and 70% of remote attacks are perpetrated at long range, i.e., not near the vehicle, that rely on network connectivity. [1]
What are these attack vectors?
All smart features can be exploited to enter the vehicle systems and vulnerability in one system is enough. When it comes to automotive cybersecurity, several attack vectors pose significant risks. Some of the systems we see in all new cars are:
A. Connected Car Systems:
1) Sensors: Vulnerabilities in sensors (such as lidar, GPS, and cameras) can be exploited to manipulate data or disrupt vehicle functions.
2) Telematics and Infotainment Systems: These systems connect vehicles to external networks, making them susceptible to attacks.
3) Remote Access: Hackers may exploit remote access features (e.g., keyless entry) to gain unauthorized control over the vehicle.
B. Software and Firmware:
1) In-Vehicle Software: Vulnerabilities in software running on the vehicle’s electronic control units (ECUs) can allow unauthorized access.
2) Over-the-Air (OTA) Updates: Malicious code injected during OTA updates can compromise vehicle security.
3) Infotainment Apps: Apps integrated with infotainment systems may have security flaws.
C. Communication Protocols:
1) CAN Bus: The Controller Area Network (CAN) bus is used for communication between ECUs. Weaknesses in CAN bus security can lead to unauthorized control.
2) Bluetooth and Wi-Fi: Insecure connections can allow attackers to manipulate vehicle functions remotely.
3) Cellular Networks: Vehicles connected to cellular networks are potential targets for cyber-attacks.
D. Authentication and Authorization:
1) Radio Frequency Authentication: Proper authentication mechanisms are crucial to prevent unauthorized access to vehicle systems.
2) Key Fobs and Smart Keys: Weaknesses in key fob security can lead to vehicle theft.
3) Access Control Units: Vulnerabilities in these units can compromise security.
E. Supply Chain and Third-Party Components:
1) Component Suppliers: Vulnerabilities in components provided by suppliers can impact vehicle security.
2) Software Libraries: Third-party software libraries may contain security flaws.
3) Ecosystem Partners: Cybersecurity risks extend beyond the vehicle itself to include partners in the automotive ecosystem.
F. Physical Interfaces:
1) Diagnostic Ports: Physical access to diagnostic ports can allow attackers to manipulate vehicle settings.
2) USB Ports: Malicious USB devices can compromise vehicle systems.
3) OBD-II Ports: The On-Board Diagnostics (OBD-II) port provides access to vehicle data and can be exploited.
Automotive cybersecurity is an ongoing challenge, manufacturers, suppliers, and regulators must work together to address these vulnerabilities and protect vehicles from cyber threats.
Sources:
1. A Look at The 2023 Global Automotive Cybersecurity Report | Tripwire