Vulnerability of fast charging stations: how hackers can hack your electric car
Researchers have discovered a serious vulnerability in the fast charging systems of electric vehicles, allowing hackers to gain access to the vehicle and modify its software. This problem is related to PLC technology and can have serious consequences for the safety of electric vehicles.
Electric Vehicle Vulnerability
Problem Detection
Experts from the Southwest Research Institute (SwRI) have identified a serious shortcoming in DC fast charging stations. This flaw provides cybercriminals with the opportunity to break into an electric vehicle's system and make changes to its software.
The essence of the vulnerability
The problem lies in PLC (Power line communication) technology, which is used to transmit data over electrical networks. This technology, which has been around since 1922, allows a variety of information, including voice, video and Internet traffic, to be transmitted through electrical wiring.
Scale of the problem
There are currently millions of electric vehicles in use around the world. Approximately 59% of owners regularly use public chargers. There are approximately 10,000 Level 3 direct current charging points (DCFC) in the US, creating a huge number of potential hacking points.
Attack mechanism
Level 3 DC charging stations use an IPv6-based PLC to communicate with the vehicle. Attackers can exploit a vulnerability at the PLC level to gain access to the network key and digital addresses of both chargers and the car. This is done through a man-in-the-middle (AitM) attack that is capable of imitating both the electric vehicle and the charging equipment.
Potential Consequences
Attacks on Level 3 DC charging stations open the door for hackers to insert malicious code into vehicle firmware, altering its functionality or turning them off completely. There is a possibility of implementing remote access and control through the vehicle’s mobile connection to the Internet.
Previous Incidents
In 2015, there was a high-profile case of Jeep Cherokee hacking, where hackers were able to remotely control various vehicle systems, including engine, steering and brakes using only the infotainment system.
Risks of changing firmware
Modification of electric vehicle software by attackers can have serious consequences, given the high dependence of modern electric vehicles on software and Internet connections. For example, the latest Tesla Model S features a powerful AMD Ryzen processor and AMD Radeon GPU, among many other processors.
Potential Solutions
To solve the problem, SwRI has developed a new "zero trust" architecture that can bypass layers of encryption. This system requires each component to confirm its identity before executing commands and monitors for anomalies in real time.
Glossary
- SwRI (Southwest Research Institute) - Southwest Research Institute, independent an organization engaged in applied research and development.
- PLC (Power line communication) - technology for transmitting data over electrical networks.
- DCFC (DC Fast Charging) - fast DC charging for electric vehicles.
- AitM (adversary-in-the-middle) - a type of attack in which an attacker intercepts communication between two parties.
- Tesla Model S is a high-tech premium electric car from Tesla.
Links
Answers to questions
What vulnerability did Southwest Research Institute engineers discover in electric vehicle fast charging stations?
What risks does the discovered vulnerability pose for electric vehicle owners?
Why are modern electric vehicles especially vulnerable to cyber attacks?
What solution do engineers propose to protect electric vehicles from cyber attacks?
How common is the problem of EV charging station vulnerability?
Hashtags
Save a link to this article
Discussion of the topic – Vulnerability of fast charging stations: how hackers can hack your electric car
SwRI engineers have discovered a vulnerability in fast charging stations that allows hackers to gain access to electric vehicles and modify their firmware using 1920s PLC technology.
There are no reviews for this product.
Write a comment
Your email address will not be published. Required fields are checked *