Site icon Check Point Blog

Allowing cybercriminals to drive your car: 5 Tips for Keeping Your Electric Vehicle Secure

More and more people are opting for electric cars, whether for innovation or environmental reasons. But the environmental and technological benefits of electric vehicles are not without risk as they present a new attack surface for cybercriminals. In fact, according to the Global Automotive Cybersecurity Report, threats against APIs will increase up to 380% by 2022, accounting for 12% of all incidents.

As electric cars implement more technological advances and become more connected, the risk of a cyberattack increases. The safety of drivers and the integrity of all the data they generate are at stake. Cybercriminals are always up to date with every attack formula and that, like them, it is imperative that the industry implements certain changes to prevent them. To achieve this, it is important to be aware of the current risks associated with electric vehicles. For this reason, Check Point Software would like to highlight the three entry points for a cybercriminal for electric cars:

  1. Remote vehicle hijacking: Imagine you are behind the wheel of an electric car, calmly enjoying your drive, and suddenly you lose control of the vehicle: it slows down, the steering wheel spins out of control, or the engine accelerates without you stepping on the gas pedal. An invisible driver has taken control of the vehicle without you being able to do anything. While it may sound like a fantasy from a fictional movie, this situation can become a reality. As electric cars become more automated and connected, they become more vulnerable to cyberattacks. Cybercriminals with advanced knowledge can exploit vulnerabilities in the car’s electronic systems to take remote control, using methods that sound like something out of a spy movie.
  2. Potential threats at charging stations: Threats at EV charging stations are a critical aspect of cybersecurity that often goes unnoticed, so it is imperative to go to secure and trusted locations.
  1. Malicious disruption of connectivity: autonomous vehicles rely heavily on communication between themselves and the road infrastructure. These connections allow them to share information about traffic, weather, and other driving factors. However, this reliance opens the door to cyberattacks that can have dire consequences, as by manipulating data transmissions, an attacker could trick vehicles into making poor decisions. A communication failure affects not just one vehicle, but other connected vehicles on the road, and can be a vulnerability that cybercriminals exploit to create confusion and traffic jams.

Check Point believes that climate change and the need to reduce our dependence on oil underline the imperative to migrate to greener forms of transportation. Concerns over cybersecurity could be another obstacle to the future growth of the electric vehicle market, so it is vital that the industry takes the threat seriously.

To keep an electric vehicle safe, it is important to keep software up to date, avoid public Wi-Fi connections, use strong passwords, and monitor the vehicle for unusual behavior. Drivers should also report any problems to the manufacturer. When using charging stations, always verify the authenticity of the station, and use secure connections. EV manufacturers should ensure the use of secure software with security built into the software, hardware deployment operations and the principle of ‘least privileged’ to restrict access to the software being used.  On the other hand, it is highly recommended to monitor transactions and report any suspicious activity.

The future of connected and electric vehicles is exciting, but it also presents significant security challenges. Addressing these and emerging challenges and ensuring secure deployment is essential to reap the full benefits of this emerging technology.

Exit mobile version