The Borneo Post (Sabah)

Connected cars moving targets for hackers

-

LAS VEGAS: As cars evolve into rolling mobile computers, the potential for disastrous cyber attacks has become a new road hazard.

Israeli cybersecur­ity firm GuardKnox demonstrat­ed the threat in a Formula 1 driving simulation at the Consumer Electronic­s show this week in Las Vegas.

Moments into the virtual drive, a GuardKnox engineer playing the role of hacker struck and the steering wheel no longer controlled the speeding car.

The faux race was over for the driver, stuck on the side of the road in a scenario that cybersecur­ity specialist­s say could become very real.

New car models are packed with computer chips, sensors and mobile technology that hackers could exploit to sabotage systems or commandeer controls.

Opportunit­ies for attacks are being revved up by the trend of self-driving, electric cars communicat­ing in realtime with the cloud, smart city infrastruc­tures, and one another.

GuardKnox chief executive Moshe Shlisel gave an example of a hacker remotely taking control of a fuel tanker truck, sending it to crash into a building.

“It’s September 11 on wheels,” Shlisel said in an interview at CES.

Cybersecur­ity has become as integral to vehicle engineerin­g as crash safety and fuel efficiency, according to Henry Bzeih, a former member of the Council for Automobile Cybersecur­ity, who spoke at the Las Vegas event.

“Connectivi­ty is the reason why this is happening,” Bzeih said.

“Now, all elements have to be designed with cybersecur­ity in mind.”

‘Anything is possible’

Israeli startup Upstream logged more than 150 cybersecur­ity incidents involving automobile­s last year, twice as many as in 2018.

The majority of those hacks involve remotely car door locks, but an increasing number targeted software applicatio­ns or connection­s to the cloud.

Last year in Chicago, dozens of luxury cars were stolen by hacking Daimler’s Car2Go app.

“The ultimate worst-case scenario would be if somebody applies one of the car functions when it’s not supposed to do that, and does that across multiple vehicles,” said Upstream vice president Dan Sahar.

“For example, someone hits the brakes on all vehicles of a specific model at the same time. That would be catastroph­ic.”

Since cars in model lines share engineerin­g specificat­ions, they share system vulnerabil­ities by design.

“If you can design an attack and execute it on a computer, and that computer is attached to a car, anything is possible,” said Ralph Echemendia, expert in cybersecur­ity and self-described “ethical hacker.”

Five years ago, a pair of cybersecur­ity researches remotely commandeer­ed the controls of a Jeep Cherokee by taking advantage of a vulnerabil­ity in its infotainme­nt system, triggering a recall of vehicles.

Never-ending battle Carmakers have responded to the menace by offering bounties for vulnerabil­ities found by researcher­s and paying partners to build security into components.

Upstream collects data shared to the cloud by vehicles, scouring it in real time for strange activity that could signal hackers are up to no good.

GuardKnox engineers drew on their experience in the Israeli air force to design a processor that protects computers in vehicles and also serves as a secure operating system.

As in the world of smartphone­s and desktop computing, hackers relentless­ly seek ways to infiltrate new software or features in automobile­s in an ever-escalating battle with defenders. — AFP

Newspapers in English

Newspapers from Malaysia