1 min read

Novel Attack Disrupts Car Charging Remotely, Research Finds

Silviu STAHIE

April 04, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Novel Attack Disrupts Car Charging Remotely, Research Finds

Security researchers working in academia demonstrated a novel wireless attack against the Combined Charging System (CCS) used in most electric cars today to allow third parties to disrupt the charging process remotely.

It might be time to add intelligent cars to the same category as smart homes. As cars include increasingly powerful hardware and become just as smart as many of our homes, criminals will undoubtedly try to develop attacks against them.

Today, many cars have cellular capability out of the gate, leaving them vulnerable, but security researchers found out that charging technologies are also targets. Combined Charging System (CCS) is one of the most used DC rapid charging technologies today, so it’s one of the more exposed.

“The attack interrupts necessary control communication between the vehicle and charger, causing charging sessions to abort,” said the researchers in their paper. “The attack can be conducted wirelessly from a distance using electromagnetic interference, allowing individual vehicles or entire fleets to be disrupted simultaneously.”

“In addition, the attack can be mounted with off-the-shelf radio hardware and minimal technical knowledge. With a power budget of 1 W, the attack is successful from around 47 m distance,” they added.

The researchers said many of the estimated 12 million battery EVs in use today are exposed to this problem. It might also extend to electric ships, airplanes and heavy-duty vehicles. The proof of concept and other details of the attack weren’t revealed because manufacturers need time to develop a solution to the problem or at least devise some form of mitigation.

It’s essential to keep in mind that only DC rapid chargers are included in the report. Most homes use AC charging and are not affected by the vulnerability.

tags


Author



Right now

Top posts

How to monitor your online privacy during your Thanksgiving trip

How to monitor your online privacy during your Thanksgiving trip

November 22, 2022

3 min read
Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

November 16, 2022

6 min read
Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

November 14, 2022

5 min read
August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Some Phone Manufacturers Didn't Implement Vital Security Patch for ARM Mali GPU, Google Researchers Find Some Phone Manufacturers Didn't Implement Vital Security Patch for ARM Mali GPU, Google Researchers Find
Silviu STAHIE

November 29, 2022

1 min read
Apple Users Report Seeing Other People's Photos When Using iCloud for Windows Apple Users Report Seeing Other People's Photos When Using iCloud for Windows
Silviu STAHIE

November 25, 2022

1 min read
How SIM Swapping Attacks Work and How to Protect Yourself How SIM Swapping Attacks Work and How to Protect Yourself
Filip TRUȚĂ

November 25, 2022

3 min read