Intelligent SME.tech Issue 35 | Page 15

intelligent

// TECH TRENDS // vulnerabilities . Failure to address them will cause a massive cybersecurity pile-up , the effects of which will hamper the EV highway for the foreseeable future .

EVs differ from legacy automobiles in numerous ways , not the least of which is the number of suppliers involved in their development , maintenance and performance . These manufacturers range from chips and firmware developers to control units and mobile apps that connect to and interact with EVs . Each point of connectivity is also a pathway that hackers are eager to exploit .
Innovation breeds new opportunity for threat actors
In addition , the technologies responsible for EV innovation are also behind many of the industry ’ s new cyberthreats . With every aspect of the vehicle linked to various computerbased subsystems , there are numerous opportunities upon which hackers can easily capitalise . Let ’ s examine some of the chief vulnerabilities in the EV ecosystem :
Advanced Driver-Assistance Systems ( ADAS )
EV manufacturers are increasingly adding some form of ADAS to vehicles . Blind spot monitoring , driver drowsiness detection and parking assistance are just a few examples that offer clear safety benefits . However , ADAS also presents hackers with multiple avenues to interact with and control an
EV . Imagine the devastation if hackers could infiltrate and override the pedestrian detection feature in a commercial EV operating in a highly populated area .
Charging networks
The roll-out of fast charging networks is critical for widespread EV adoption . Unfortunately , this charging infrastructure also introduces numerous vulnerabilities , ranging from skimming credit card data at the point of charge to using cloud servers to hijack an entire EV charger network . Charger Wi-Fi , USB or Ethernet maintenance ports are other entry points hackers could exploit to obtain system access .
Once threat actors successfully hack an EV charging station , they can then access the car and impact its performance by turning off the headlights or disabling the brakes , for example . Locking the car until a ransom has been paid is another concern , as is exploiting charging stations to display political messages , which recently occurred with hacked EV charging stations in Russia . In addition to these and other attack scenarios , there is also the secondary impact of mission-critical vehicles like fire engines and ambulances being unable to respond .
Payment systems
As mentioned , skimming card data from charging station systems is one security concern , but the payment system problem is much more widespread . Card data is linked to in-vehicle infotainment systems as well as numerous third party companies that are increasingly partnering with EV manufacturers . As these relationships deepen and the EV ecosystem grows expect payment systems to become an increasingly popular attack avenue .
Security is often an afterthought
Despite the EV industry ’ s myriad security concerns , protecting these vehicles and their associated infrastructure from attack has yet to receive the prioritisation it deserves . Automakers and other stakeholders are eager to capitalise on the market opportunity and , at best , put security on the back burner or , even more concerning , leave loopholes that can be exploited .
Marie Hattar , Chief Marketing Officer , Keysight Technologies

MANY NEW EVS ARE CHEAPER TO OWN AND OPERATE THAN THEIR GASOLINE- POWERED EQUIVALENTS .
Intelligent SME . tech
. tech
15