Currently, with the advancement of technology, vehicles have become even safer. Devices such as automatic braking, autonomous steering, parking assistant – among other technologies – have made drivers’ lives easier.
However, there is a new technology that exposes weaknesses and leaves the vehicle vulnerable to cyber attacks.
Therefore, more modern cars that have internet connections and cell phones are in imminent danger.
Understand more about this new technology that can harm your vehicle and expose it to theft: the internet of cars.
Security Bypass
Theoretically, one of the safest ways to prevent a car from being stolen are smart keys, which are designed to make it difficult for criminals to act.
To drive the car, the owner presses a button on the key fob that deactivates the car's immobilizer (a device that prevents the car from starting without the key).
However, there is a way to bypass this system and this involves a hand tool that tricks the car into “thinking” that the smart key is closer than it actually is.
To prevent this type of fraudulent action from happening, you can place your car keys in a bag, or far enough away from the vehicle, to block its signals.
But, now with the advancement of technology and cars becoming increasingly connected to devices that use the internet, there are now more advanced methods of attempted theft – known as cyber attacks -, and this is becoming increasingly common.
“CAN injection attacks”, which establish a direct connection with the vehicle's internal communication system (CAN bus), can control the car as a whole and cause a series of problems, including accidents or theft.
Zero trust approach
With the prospect of a possible epidemic of vehicle theft, manufacturers are testing new ways to eliminate this new vulnerability as soon as possible.
Therefore, one of the strategies is to distrust the messages that the vehicle receives (known as the “Zero Trust Approach”).
READ TOO:
- Kiss nightclub where to watch the series
- Download tiktok videos without watermark
- FIND OUT THE COOLEST TOURIST SPOTS IN YOUR CITY BY SATELLITES
In this “Zero Trust Approach” system, all messages must be verified.
One way to extend protection is to install a hardware security module in the vehicle.
Thus, the module works by generating encryption keys that allow data to be encrypted and decrypted - making internal vehicle communication more secure.
Therefore, the automotive industry is increasingly testing new mechanisms in modern cars to make them not only more technological, but insurance also.
Attacks on information and entertainment systems
However, another safety concern in modern vehicles is the on-board computer system.
Also known as an “information and entertainment system”, it keeps a series of records about the vehicle.
Some potential vulnerabilities in this system are often ignored, even though their repercussions could be catastrophic for the driver.
An example is the possibility of an attacker hacking the system and using a “Remote Code” to transmit malicious codes to the vehicle system, thus harming the car and the driver.
In a recent case reported in the United States, an infotainment system was hacked and served as an entry point for attackers to insert malicious code, which controlled some components of the car.
Such an attack can obviously disrupt vehicle operation, causing accidents.
Therefore, testing new technologies that prevent these attacks is something that many automakers are currently working on.
Attacks of this type can exploit numerous vulnerabilities, such as the vehicle's Internet browser, USB devices, etc.
Therefore, all drivers of vehicles equipped with infotainment systems should have a good understanding of the basic security mechanisms that can protect them against these attacks.
The possibility of an epidemic of car theft and insurance claims due to an attack on the CAN network is a frightening prospect!
Therefore, it is necessary to find a balance between the potential risks and benefits of internet of cars, so that everyone can drive in a connected, fun and safe way.
services
For more information access Tecmundo.