Automotive
The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased connectivity broadens the attack surface of the car New vulnerabilities are constantly being uncovered Cyber criminals are targeting these weaknesses with a number of different attacks The cyber landscape The original concept of security in the automotive industry was around making a car hard to steal. Being physically secure was the focus. But now, having secure technology has become of critical importance. This is all down to increased connectivity within the car. From consumer devices interfacing with infotainment systems, to tyre pressure monitoring systems, the connections to and from the car are where the vulnerabilities lie. On top of this, service providers are in constant contact with modern cars, providing another route in for hackers. With the looming introduction of vehicle ad-hoc networks, where vehicles communicate wirelessly with each other and the roadside, the technologies that malicious hackers can exploit are set to grow exponentially. 2 Automotive Sector Automotive Sector 3
The cyber threat landscape V2x Vehicle to Everything communications Intelligent transport of the future will rely heavily on the ability of vehicles to communicate with each other, with roadside technology, with real-time traffic data and to provide safety alerts to pedestrians or cyclists. As the transmissions are all sent via wireless technologies, the potential for disruption as a result of denial of service, data tampering or data injection attacks could have serious implications for the safety of road users and pedestrians. There are also data privacy concerns around the ability to track vehicles using V2x data. INTELLIGENT TRANSPORT INFRASTRUCTURE NAVIGATION DAB & FM RADIO RADIO FREQUENCY INTERNET DEVICES APP CONTENT PROVIDER INSURANCE COMPANY BREAKDOWN SERVICE Telematics data Connected cars generate and consume vast amounts of data. This could be emergency and breakdown services, virtual concierge, driving ability data for insurance providers, streaming audio and just-in-time parts ordering, to name but a few. Some of this data is highly sensitive and some of it is personal in nature. Therefore, its protection using appropriate encryption, both in transit and at rest, is vital. Data protection legislation such as General Data Protection Regulation (GDPR) is therefore of key importance. SUPPLY CHAIN/MANUFACTURING SENSORS USB EMERGENCY SERVICES Diagnostics connectivity In order to provide the capability to diagnose faults within the electrical system, a diagnostics port is provided in all modern vehicles. However, the functionality required by garage mechanics, e.g. updating firmware, provisioning keys or configuring components, can also be abused by an attacker who has access to the vehicle s network. VEHICLE MOBILE NETWORK TELEMATICS SERVICE PROVIDER Electric Vehicle (EV) charging With the rise of Plug-in Hybrid Electric Vehicles (PHEV) and Electric Vehicles (EVs) comes the requirement for smart charging infrastructure that transmits not only power but also communications data. This transmission of data is between the electric vehicle supply equipment (EVSE), which is more commonly known as a charging station, and the vehicle. The exchange of data (and subsequent data processing) within the vehicle at power distribution network operators means that both could potentially be attacked via a rogue EV or a rogue EVSE which sends malicious data alongside power. POWER DISTRIBUTION OEMs & Tier 1s DEALERSHIP Autonomous sensors Each sensor used to provide an autonomous vehicle with an awareness of its surrounding environment increases the attack surface, as the wireless technologies can be tampered with. The information collected by these sensors is often combined in a sensor fusion device where various weightings are applied to the importance of data from different sources and then decisions are made by the vehicle. Therefore, if these decisions can be manipulated by attackers targeting the sensors with malicious data, this can negatively impact the safety of the vehicle, its occupants and other road users. USB USB ports are now expected by consumers in vehicles, not only for charging mobile devices but also to transfer media to and from infotainment systems. However, default support for other USB devices is often left enabled in production vehicles, which means that the vehicle is capable of communicating with many other USB products such as printers, network cards and cameras. All constitute a significantly increased attack surface. Vulnerabilities in the software drivers for these devices can often provide unauthorised access to the infotainment system or even to the vehicle s network. Wireless technologies Common wireless technologies, such as Wi-Fi and Bluetooth, along with less common protocols such as Tyre Pressure Monitoring Systems (TPMS), are found within modern connected cars. If these are misconfigured or have been developed using vulnerable software components, these can potentially be abused by attackers to provide remote connectivity to vehicle systems. Manufacturing and supply chain The automotive supply chain can be complex and assumptions are often made about who is responsible for the cyber security of a vehicle system or component. It is often the interfaces between components (connected during their integration into a vehicle) that security vulnerabilities can be introduced as a result. Therefore, integration security assessments in the vehicle manufacturing process are critical in order to identify these as early as possible. 4 Automotive Sector Automotive Sector 5
Automotive Assurance for the connected vehicle ecosystem The concept of the Secure Development Lifecycle (SDL) forms the core of our services within the Transport Assurance Practice, providing security assurance at each stage of the development lifecycle for systems and components. The approach ensures that system-level attack points are recognised and departments within an organisation can agree upon who implements each countermeasure. The Transport Assurance Practice at NCC Group was created as a direct result of performing ground breaking researchdriven security testing and consultancy for a number of leading companies in the automotive sector. This involved the development of new tools and techniques that can be applied across the industry. Our team leverage the services offered by other areas of our business including cyber defence operations, software testing and software escrow to provide a comprehensive suite of assurance solutions. System Design Architecture Incident Response Planning Asset Protection Definition Training Security Assessment Threat Modelling Best Practice Guidance Define Counter Measures www.nccgroup.trust/automotive 6 Automotive Sector
About NCC Group NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape. With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate & respond to the risks they face. We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security. For more information from NCC Group, please contact: +44 (0) 161 209 5111 automotivesecurity@nccgroup.trust www.nccgroup.trust/automotive NCCGAUTOMOTIVEV010617