Automotive Hacking: Automobiles and Cybersecurity

As automobiles become more and more sophisticated by the day, the kind of issues they experience becomes broader. Previously, the common problems experienced by automobiles were issues with hardware parts; a failed brake, leaking gas tank, tyre issue…


This content originally appeared on DEV Community and was authored by Joseph Chisom Ofonagoro

An illustration of Automotive Hacking by Joseph Chisom Ofonagoro

As automobiles become more and more sophisticated by the day, the kind of issues they experience becomes broader. Previously, the common problems experienced by automobiles were issues with hardware parts; a failed brake, leaking gas tank, tyre issues.

These days, with automobiles being integrated into the Internet of Things, their worth has increased, so with the problems, especially problems of security. Many automobile users no longer worry much about a random dude stealing their car by shattering the glass or using a master key, but now, a lot of them are beginning to worry about their cars being remotely stolen and even controlled.

One thing technology synchronization has brought to us is the ability to easily access many of our information on different devices anytime and anywhere we are, and with automobiles being integrated into this big IoT family, people are now comfortable with their cars having access to many of their data, even if it was originally stored on their phone. That’s convenient right? But it also poses a significant risk that seems to be on the rise every day.

And here comes Automotive Hacking.

Simply put, this is a term that describes the process of illegally manipulating automobile systems. The use of that term has grown in recent times as our cars continue to become more digitally advanced.

In this article, I am going to be breaking down what Automotive Hacking is in such a way that the average automobile owner can easily understand.

Common Attack Vectors of Automotive Hacking.

Just like in biology, we all know that a disease vector is a medium through which a disease is transmitted and spread.

This also applies to computer network security. These vectors are the medium that attackers use in delivering their attacks on automobiles. In other words, by gaining access to these mediums, attackers can exploit your automobile.

Under this section, I will be listing the common ones and how attackers use them to find their way in.

Bluetooth

:

Even the not so sophisticated cars have bluetooth technology in them. This allows your car to communicate with your phone or in some cases, bluetooth can be used to unlock and start an automobile if it uses proximity sensors. Such technology uses Bluetooth Low Energy to establish communication.

While it was made for seamless usage and convenience, it can be a very potent vector for automotive hacking as attackers can use relay attacks to extend the range and unlock an automobile from lengthy distances.

WiFi

:

I bet you guessed that this was the next on the list. Well, here it is.
Newer automobiles can connect to the internet to stream movies, access maps and traffic info or even download software updates.

Since they can access the internet, they are no different from our computers when it comes to cyber vulnerabilities and if their WiFi security is broken, attackers can have an easy pass through.

Sometimes, these attackers specifically target an automobile’s WiFi just to gain access and considering the fact that some people don’t turn off their WiFi for easy connection, the barricade becomes lighter.

WiFi attacks can be more lethal as most WiFi enabled automobiles connect to their manufacturer with WiFi connectivity and by gaining access to such a network, attackers can sniff packets or carry out MiTM attacks.

USB

:

While not that common, USB can still provide an entry for hackers into an automobile’s system especially if the automobile was configured for data transmission.

This can be done if they have physical access to the automobile, and with a proper social engineering heading the intended way, an attacker can compromise an automobile. Sometimes , social engineering can be as stealth as swapping a USB stick ensuring that the target unintentionally compromises their automobile themself.

Mobile Apps

:

A lot of automobile companies now have mobile apps that permit their automobile users to carry out specific functions on their cars remotely. Some manufacturers go as far as even permitting their automobiles to connect with third party mobile apps.

These apps could have permission to manipulate sensitive features in a car and if the app gets compromised, it could lead to a compromise of the automobile.

Risks Associated With Automotive Hacking

Data Theft

Due to synchronization between automobiles and other devices, compromising an automobile’s system could lead to theft of data generated from the car or another device in its network.

Automobile Accidents

Imagine an assassination delivered via an auto hack? By gaining access to a car’s software and hardware, a malicious actor could monitor a car’s real time location and relay such to other actors, or they could even potentially cause the break to become faulty or increase a car’s speed causing an automobile crash or putting the owner into legal issues.

Reputational Damage and Devaluation

Just as a company can experience a massive devaluation of its stock price after a cyber attack, automobiles that are prone to automotive hacking can have negative effects on their companies as people would buy their cars less inadvertently leading to loss of stock value.

Combating Automotive Hacking

The following methods have proven to have the potential of minimizing automotive hacking.

Network Segmentation

By ensuring that essential parts of an automobile run on isolated networks, more like a DMZ, a hack on one component won’t affect other components of the car. Though, this is quite complex as cars generally work hand to hand with other components and segmenting them means that manufacturers would find another way to ensure that communication remains seamless.

Secure Boot

Secure boot ensures that during the startup of an automobile, the integrity of its firmware is checked. This prevents malware from being loaded into the system and if a malware is already on the automobile’s system, the car wont start.

Cryptographic Integrity Verification

This ensures that before certain car functions are enabled, verification needs to be made to ensure that the user requesting the function is the authenticated one. While this might affect convenience a bit, the advantages it brings far outweigh the disadvantages.

Software Updates

Constantly updating all software on devices that are linked to your automobile is a very healthy practice. Updating your automobile’s software and leaving your phone’s software outdated can still open up your automobile to vulnerabilities since you are coming in as a validated user.

Firewalls and IPS

Automobiles require traffic filtering to block unwanted networks from accessing them. Additionally, if an attempt was made to launch an attack on a software, an Intrusion Prevention System can come in, blocking and alerting the user.

Becoming Security Aware

Humans are the weakest link in the security sphere, thus, it is imperative that we all understand what we have signed up for and how to combat them. An automobile user with advanced technologies, but careless is like one without security.

Conclusion

In summary, automotive hacking is a growing threat as cars become more interconnected and embedded in the IoT ecosystem.

Modern vehicles, now equipped with advanced digital interfaces, wireless connections, and even mobile applications, face risks that were once unheard of in the automobile world. Attackers are constantly finding new methods to exploit these systems, leading to potential data theft, car accidents, and even risks to personal safety.

The good news is that both automotive manufacturers and drivers can take steps to reduce these risks. By implementing these preventive and defensive strategies, manufacturers can build more resilient vehicles. For drivers, adopting security-conscious habits, like turning off WiFi when not needed and avoiding risky USB devices, can also help protect their cars.

As vehicles continue to evolve with technology, the commitment to cybersecurity needs to be just as dynamic.
Manufacturers, drivers, and cybersecurity experts must stay alert to these risks and adopt the latest measures to keep our vehicles secure, ensuring that innovation in automobile technology enhances safety, convenience, and trust on and off the road.


This content originally appeared on DEV Community and was authored by Joseph Chisom Ofonagoro


Print Share Comment Cite Upload Translate Updates
APA

Joseph Chisom Ofonagoro | Sciencx (2024-10-31T18:18:13+00:00) Automotive Hacking: Automobiles and Cybersecurity. Retrieved from https://www.scien.cx/2024/10/31/automotive-hacking-automobiles-and-cybersecurity/

MLA
" » Automotive Hacking: Automobiles and Cybersecurity." Joseph Chisom Ofonagoro | Sciencx - Thursday October 31, 2024, https://www.scien.cx/2024/10/31/automotive-hacking-automobiles-and-cybersecurity/
HARVARD
Joseph Chisom Ofonagoro | Sciencx Thursday October 31, 2024 » Automotive Hacking: Automobiles and Cybersecurity., viewed ,<https://www.scien.cx/2024/10/31/automotive-hacking-automobiles-and-cybersecurity/>
VANCOUVER
Joseph Chisom Ofonagoro | Sciencx - » Automotive Hacking: Automobiles and Cybersecurity. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2024/10/31/automotive-hacking-automobiles-and-cybersecurity/
CHICAGO
" » Automotive Hacking: Automobiles and Cybersecurity." Joseph Chisom Ofonagoro | Sciencx - Accessed . https://www.scien.cx/2024/10/31/automotive-hacking-automobiles-and-cybersecurity/
IEEE
" » Automotive Hacking: Automobiles and Cybersecurity." Joseph Chisom Ofonagoro | Sciencx [Online]. Available: https://www.scien.cx/2024/10/31/automotive-hacking-automobiles-and-cybersecurity/. [Accessed: ]
rf:citation
» Automotive Hacking: Automobiles and Cybersecurity | Joseph Chisom Ofonagoro | Sciencx | https://www.scien.cx/2024/10/31/automotive-hacking-automobiles-and-cybersecurity/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.