Supercars the next target for cyber criminals?

Supercars the next target for cyber criminals?


Supercars the next target for cyber criminals?


Cars are now a genuine target for cyber criminals and it is possible for attackers to gain control of a vehicle while it is in motion, with disastrous consequences, according to security analysts.

Alex Fidgen, Director at IT security company MWR InfoSecurity, said: “It is feasible that an exploitation of any number of embedded devices within a car might allow an attacker to gain control. For instance, this would have serious consequences if the brakes were applied at high speed.”

Fidgen’s comment was made after Volkswagen allegedly sued the University of Birmingham to stop it from publishing how it had hacked anti-theft systems on luxury cars such as Lamborghinis (ABOVE) and Porsches.

“Vendors should not try to block security research, they should work together with the researchers to understand the nature and potential consequences of the threats they are facing,” said Fidgen. “Resorting to legal action to block such details from being published is the wrong approach. Manufacturers should instead incorporate strong security research in the design process.”

He added: “There are real concerns about the attitude of VW given they appear to be trying to suppress this information rather than working to rectify it. Manufacturers do not seem to have considered the security threat when using embedded computer systems. Cars are becoming increasingly more computerized, particularly supercars. But not enough thought appears to have gone into securing the systems which leaves the cars wide open to theft and the misuse of computer information.”

Fidgen indicated that such IT vulnerabilities could potentially have very serious impacts, both from security and financial perspectives, as cyber criminals target companies on a daily basis.

“Volkswagen have only highlighted to the criminals out there that the problems are likely to be genuine and important, so the damage has already been done,” he added. “There is a long track record of companies using legal action to try to prevent vulnerability information from being understood. This has probed to be highly ineffective as in most cases the security community was able to obtain the information through different research teams.

“Car manufacturers continually try to upstage each other with the latest computer gizmo’s’ for vehicles. They are on a never-ending treadmill to try and keep ahead and offer their customers the latest technology. However, they now need to take a step back and look at how security should be embedded.

“From a customer point of view, it’s not just about the car being stolen, it’s about the owners personal information being stolen from mobile phones and other mobile devices that are linked to the cars on board computer systems. From the manufacturers’ perspective, it’s about the latest gizmo being stolen by competitors.”

MX-5 Cup | Round 10 – Road America