will install an antivirus on our next car? It’s no nonsense. The technological evolution of automobiles is not leading to unexplored paths. The automotive industry is facing problems that until recently only concerned with technological, developers of personal computers, gadgets, software and nothing that should worry about driving a car. And while Volkswagen announced that in 2020 produced more than ten million “ smartphones on wheels” a year, Intel and McAfee warn of the danger of hackers and remind us 15 items eligible for a hacker attack car .
McAfee and Intel have identified 15 systems that would be more prone, more vulnerable to attack by a hacker.
McAfee divided vulnerabilities car into three broad categories : those affecting remote interfaces; functions “ciberfísicas”, which are those that collect data and take a decision, such as adaptive cruise control or automatic emergency braking; and finally, network architectures of a car.
Thus, McAfee and Intel have developed a document of “good practice” to require developers and manufacturers to exercise extreme caution in the design of new technologies and interfaces to prevent security and privacy of passengers is put at risk.
What elements are susceptible of a hacker attack on a car as Intel and McAfee?
1. The connection to your smartphone . It is evident that the interaction of the smartphone with our car, without wires, is growing, and with it the risk of an attack leveraging this wireless interface increases.
2. Remote Link Type App . Residents in our smartphone applications that “run” (often the only car display serves only as a screen, and not to execute code) in car entertainment equipment.
3. Airbag ECU . The hardware and the control unit which controls the operation of the airbag can not only be exposed to an attack, but is also a critical safety element of a car.
4. OBD II . The data port – A physical connection present in all cars – our vehicle. Hackers who “thundered” a Jeep Cherokee began experimenting with a Prius and a malicious system connected to its port OBD .
5. USB . Connections USB our car can also facilitate malicious access, which as in the previous case would require physical access to the inside of our car.
6. Bluetooth . Our cars are “open” permanently abroad using a Bluetooth wireless interface. That does not mean that we are exposed, but the risk that a hacker can access our car breaking the security protocols used by Bluetooth connection exists.
7. Receiver DSRC (V2X) . Very soon, our cars will enjoy wireless protocols that make these are permanently connected to the infrastructure. A technology that will improve, and much, our security. But another element susceptible to attack.
8. Access “hands-free” . It has been shown that access system and keyless start, allowing us to access the drive without removing the key from his pocket, they are susceptible to attacks. Even came a recommendation, reasonable and worthy of urban legend, recommending that users of such technologies keep your keys in the refrigerator.
9. Remote Opening doors . Today it is possible and even, in many models (usually premium), open the doors without a key. Simply having a mobile phone, download an application and, of course, the user credentials of the car that we want to open.
10. TPMS . The tire pressure sensors also employ a wireless connection protocol susceptible to attack.
11. The control of lighting systems , indoors and outdoors.
12. car engine control unit and transmission .
13. braking and steering systems , which are becoming more independent – as can operate autonomously – and dependent on what happens around us – because that is based on autonomous operation conditions other external sensors detect, for example, a pedestrian crossing a street without looking.
14. The control car access .
15. Other driving aids as automatic parking attendants, or adaptive cruise control.
Source: McAfee | Intel