Guidance For Connected Vehicle Security

“In the near future, connected vehicles will operate in a complex ecosystem that connecting vehicles not only with each other and the traffic infrastructure, but also with new forms of connectivity and relationships to cloud-based services, smart homes, and even smart cites,” said Brian Russell, chair of the CSA IoT Working Group

“For a safe and secure transportation system, the community must take a fresh look at the larger picture, and develop the policies, designs, and operations that incorporate security throughout the development.”

Automobile connectivity today is evolving on a number of fronts. Platforms designed in the pre-connected era are now being connected in multiple ways. This has allowed security researchers to gain access to sensitive vehicles.

Sensitive functions can be compromised via direct access, such as with USB and the On Board Diagnostic (OBD-II) port, or by remote access such as infotainment consoles, Bluetooth, WiFi and cellular devices.

One of the more interesting topics for conversation at RSA Conference 2017 in San Francisco this year was the IoT and the next generation of ransomware. After all, if you can make money encrypting people’s hard drives (and you can, a LOT of money,) then surely the explosion of smart devices could offer the ingenious criminal even more opportunity to make money fast.

So how does this change how we think about things like ransomware? After all, it’s not likely that we’ll see weaponised encryption techniques holding data hostage when most of the IoT devices are more likely to be throwing data back up to some service as fast as their little wireless card will let them. What is more likely is that attackers will hold them hostage, by shutting them down, making them disappear, or turning them into, well, evil.

For example, the story of the hotel in Austria who discovered that smart door locks are great until someone else controls them, and they want money to let the guests back in. Not good – especially when you have hundreds of angry guests wanting to go to bed.

This kind of Denial of Things (DoT) attack is going to be increasingly effective as the IoT becomes more and more embedded in the fabric of our homes, offices, and cities.

Consider, for a moment, the 15 million+ trucks in the US. Autonomous trucking is clearly on the horizon, yet imagine the social and economic impact if one day those trucks simply stopped. An attack on autonomous vehicles like trucking doesn’t have to be some kind of science-fiction scenario to be devastating.

Rather, as autonomous trucks (or any other vehicle) become a reality, they are likely going to be highly connected to management systems, tracking systems, smart infrastructure, freight tracking systems, and so on. In short, an attack surface, the size of an 18-wheeler. The only thing an attacker would have to do is simply tell them to stop. All at once. And then brick the system, so that it takes a lot of time and effort to clear the roads and get them moving again. Imagine millions of trucks simply grinding to a halt across the country. Think your morning commute is bad? It could get a whole lot worse.

Of course, I understand that this may be far easier said than done, and that all kinds of safeguards will be in place to prevent this from happening. That the trucking industry and autonomous vehicle manufacturers will take security very seriously. 

Nevertheless, let’s be under no illusions that the explosion in devices will offer up countless opportunities to inflict cost, discomfort, and possibly actual physical danger to users and innocent bystanders alike, and controlling that risk will bring with it monetary value.

As usual, the good news is that we’re not there, yet. But “there” isn’t very far from “here” and the attackers know it. This kind of attack isn’t just the kind of thing that commercial hackers would be interested in, either. Far from it – the level of impact rises quickly to be something a non-too-friendly nation state would be interested in, also. Pretty soon those “kinetic IoT” devices become part of the critical infrastructure, and should be treated, and regulated, as such.

Taking control of such complex and deeply intertwined systems will be a tempting target that we need to plan to protect, and force protection of, at the Federal Government level. Otherwise turning the entire US road system into a giant, perpetual truck stop is going to be available at the flick of a switch.

HelpNetSecurity:             HelpNetSecurity:

You Might Also Read: 

Hackers Could Turn Off Your Car Engine – While You Are Driving:

 

« Employees That Cause Data Breaches
How Social Media Influences Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.

SteelGate

SteelGate

SteelGate’s core capabilities are centered around architecture design and engineering of network, systems, and cybersecurity solutions.