Connected Cars Technology Vulnerable to Cyber Attacks
February 16, 2021 | PRNewswireEstimated reading time: 2 minutes
Trend Micro Incorporated, a global leader in cybersecurity, has announced a major new study into connected car security that describes multiple scenarios in which drivers could encounter attacks that threaten the safety of themselves and others.
The report reveals the scope of the cybersecurity risks examined. Researchers evaluated 29 real-world attack scenarios according to the DREAD1 threat model for qualitative risk analysis. These attacks could be launched remotely against and/or from victim vehicles. Examples and highlights include:
- DDoS attacks on Intelligent Transportation Systems (ITS) could overwhelm connected car communications and represent a high risk.
- Exposed and vulnerable connected car systems are easily discovered, making them at higher risk of abuse.
- Over 17% of all attack vectors examined were high risk. These require only a limited understanding of connected car technology and could be accomplished by a low-skilled attacker.
"Our research shows that there are ample opportunities for attackers looking to abuse connected car technology," said Rainer Vosseler, threat research manager for Trend Micro. "Fortunately, there are currently limited opportunities for attacks, and criminals have not found reliable ways to monetize such attacks. With the U.N.'s recent regulations requiring all connected cars to include cybersecurity, as well as a new ISO standard underway, now is the time for stakeholders across the industry to better identify and address cyber risk as we accelerate towards a connected and autonomous vehicle future."
More than 125 million passenger cars with embedded connectivity are forecast to ship worldwide between 2018 and 2022, and progress continues to advance towards fully autonomous vehicles. This advancement will create a complex ecosystem comprising cloud, IoT, 5G and other key technologies. It also features an enormous attack surface comprising potentially millions of endpoints and end users.
As the industry develops, there will be multiple opportunities for monetization and sabotage for cybercriminals, hacktivists, terrorists, nation states, insiders and even unscrupulous operators, the report warns. Of all 29 attack vectors studied, the overall risk of successful cyber attacks was assessed as Medium. However, as SaaS applications become embedded in the Electrical/Electronics (E/E) architecture of vehicles and cybercriminals create new monetization strategies, an evolution in attacks will lead to higher risk threats.
To mitigate the risks outlined in the study, connected car security must be designed with an integrated view of all critical areas to secure the end-to-end data supply chain. Trend Micro has the following high-level guidance for protecting connected cars:
- Assume compromise and have effective alert, containment, and mitigation processes.
- Protect the end-to-end data supply chain across the car's E/E network, the network infrastructure, backend servers, and VSOC (Vehicle Security Operations Center).
- Apply lessons learned to further strengthen defenses and prevent repeat incidents.
- Relevant security technologies include firewall, encryption, device control, app security, vulnerability scanner, code signing, IDS for CAN, AV for head unit, and much more.
Testimonial
"The I-Connect007 team is outstanding—kind, responsive, and a true marketing partner. Their design team created fresh, eye-catching ads, and their editorial support polished our content to let our brand shine. Thank you all! "
Sweeney Ng - CEE PCBSuggested Items
Samsung Cuts 2nm Wafer Prices to Undercut TSMC
09/30/2025 | I-Connect007 Editorial TeamSamsung Electronics has lowered the price of its 2-nanometer wafers to approximately $20,000, undercutting rival Taiwan Semiconductor Manufacturing Co. (TSMC) by about one-third, Digitimes reported on September 29.
Weaning the U.S. Military Off a Tablet Supply Chain That Leads to China
09/08/2025 | Jim Will, USPAETablet computers are essential to how our military fights, moves and sustains, but these devices are built on a fragile global supply chain with strong ties to China. Building domestic manufacturing to eliminate this vulnerability is feasible if we tap into the information and capabilities that already exist and create strong demand for tablets produced by trusted and assured sources.
Fresh PCB Concepts: Designing for Success at the Rigid-flex Transition Area
08/28/2025 | Team NCAB -- Column: Fresh PCB ConceptsRigid-flex PCBs come in all shapes and sizes. Manufacturers typically use fire-retardant, grade 4 (FR-4) materials in the rigid section and flexible polyimide materials in the flex region. Because of the small size, some rigid-flex PCBs, like those for hearing aid devices, are among the most challenging to manufacture. However, regardless of its size, we should not neglect the transition area between the rigid and flexible material.
Semiconductors Get Magnetic Boost with New Method from UCLA Researchers
07/31/2025 | UCLA NewsroomA new method for combining magnetic elements with semiconductors — which are vital materials for computers and other electronic devices — was unveiled by a research team led by the California NanoSystems Institute at UCLA.
Japan’s OHISAMA Project Aims to Beam Solar Power from Space This Year
07/14/2025 | I-Connect007 Editorial TeamJapan could be on the cusp of making history with its OHISAMA project in its quest to become the first country to transmit solar power from space to Earth, The Volt reported.