Updated Aug 16, 2018 - Energy & Environment
Expert Voices

Advantages of connected cars come with cybersecurity risks

a cloud connected by dotted lines to six blinking "open car door" warning symbols

Illustration: Rebecca Zisser/Axios

The internet connectivity built into most new vehicles enables all sorts of conveniences — news, entertainment, weather and even over-the-air software updates from the manufacturer. The downside: Connected cars are incredibly easy to hack.

The big picture: With 16 million new cars and trucks sold every year in the U.S., these cybersecurity risks are already extensive and will only grow as the push toward autonomous vehicles continues.

Today's connected vehicles sync up with crash avoidance systems, adaptive cruise control, lane departure warnings and other networked safety components. They contain up to hundreds of processors and electronic control units (ECUs), each with its own processor. One ECU might control the braking system, another the lights, yet another tire pressure. These powerful ECUs are typically connected, sometimes wirelessly, to the car’s main computer and to each other by a data bus — sending and receiving data, files and commands.

Protecting vehicle ECUs and entertainment systems against hackers — via operating system updates, file backups, antivirus software upgrades, malicious software screening tools, and the latest web browser — takes anywhere from a few seconds to a few minutes a month. Yet those brief moments per processor, across the hundreds of processors in each car, make for a formidable task.

Moreover, there are no rules dictating who is responsible for ensuring that needed updates and upgrades happen at all, let alone in a timely fashion — a regulatory gap that increases the potential openings for malicious actors. Without a commitment from the manufacturer to verify that software and firmware are functional and up to date, vehicle operators are left vulnerable. A critical safety feature could be disabled by obsolete logic — or, potentially worse, by the installation of embedded malware.

By exploiting many of the same vulnerable entry points found in smart phones and laptops, hackers can gain control of a car's microphones, lights and components over internet, bluetooth or internal wireless connections. Once in the system, they can surreptitiously listen in on conversations, intercept calls, access private data and, in certain situations, assume control of or compromise a car’s operational and safety systems. Under remote control, the distinction between changing the radio station and changing the car's speed is simply the push of a button.

Be smart: If vehicle cybersecurity does not receive serious oversight and attention now — from manufacturers, governments and drivers — it will soon become a critical impediment to safety and privacy.

Jason Levine is executive director of the Center for Auto Safety.

Go deeper