Top 5 Security Risks for Connected Cars
June 13, 2018
Beth Kindig
Lead Tech Analyst
The global market for connected cars will grow by 270% by 2022 with 125 million passenger cars expected to ship worldwide between 2018 and 2022.1 By 2020, it’s estimated that UK, France and Germany will reach 100% connected car penetration. Growth in the European region is due to the eCall mandate which requires new cars to automatically dial the 112 emergency number in the event of a serious accident.2 While North America and Europe lead in the highest percentage of shipments, China accounts for 32% of shipments.
The list of connected features enjoyed by consumers that add more opportunities for security attacks include streaming radio, Wi-Fi access points and remote-control mobile phone applications. However, with these conveniences comes responsibility. The recent death of a woman in Arizona who was struck by an Uber in autonomous mode has put a spotlight on what can go wrong in connected vehicles as manufacturers seek to introduce more high-tech features to remain competitive to car buyers. Not surprisingly, 68% of Americans are fearful of cars with self-driving features.3
The increasing number of smart features built into cars opens door to a serious threat – hacker attacks. Because connected cars are linked with the Internet and its crucial parts are interconnected over a network, adversaries have the potential to remotely access and manipulate the data being exchanged leading to a number of problems, such as leaked personal information, overcoming vehicle’s security mechanisms, or even full remote control of the car.
Threats to the Connected Car
Innovative automakers, software developers, and tech companies are transforming the automotive industry. Drivers today enjoy enhanced entertainment, information options and connection with the outside world. As automobiles move towards more autonomous capabilities, the stakes will raise in regards to security. Even if cars are not entirely driverless, the functions will become increasingly dependent on applications, connectivity, and sensors. Vehicle-to-vehicle (V2V) and Vehicle-to-Infrastructure (V2I) allow the car to communicate with other cars and infrastructure such as traffic lights. Vehicle speed adjustments, telematics, and AI voice recognition and interfaces will become common features.
The rapid increase of these technologies inevitably creates the risk of hackers gaining access and control to the essential functions and features of those cars and utilizing information on drivers’ habits for commercial purposes without the drivers’ knowledge or consent.
Here are some of the risks for connected cars:
- Stealing personally identifiable information(PII): Today, sensors generate 25 GB of data per hour and this is expected to double considering there will be 200 sensors installed in connected cars by 2020 up from 100 sensors in 2015. Once autonomous vehicles become mainstream, the 17,600 minutes Americans spend driving annually will equate to 300 TB of data per year.4 Financial information, personal trip information, location information and entertainment preferences are just some examples of PII that can potentially be stolen through a vehicle’s system.
- Connection security: Like other connected devices, vendor implementation flaws are often exploited by researchers for proof-of-concept attacks. However, it is inevitable that these will be followed by real life attacks. The current poor state of security on connected cars creates a tempting target for cyber criminals.
- Manipulating a vehicle’s operation: Catastrophic incidents resulting in personal injury and lawsuits may be in the near future. Well-known cybersecurity researchers Charlie Miller and Chris Valasek have demonstrated several proof-of-concept attacks where they were able to control the braking and steering of a car by accessing the adaptive cruise control system.5 Although costly and with a lower likelihood than data breaches and unauthorized entry, this sort of attack has now been proven possible to a global audience.
- Unauthorized vehicle entry: Car thieves now have a new way to gain entry into locked vehicles. Many vehicle technologies have opted to replace physical ignition systems with keyless systems using mobile applications or wireless key fobs. These new access mechanisms mean that methods of obtaining illicit entry include intercepting the wireless communication between the vehicle and the mobile application or between the wireless fob and the vehicle to gain entry credentials, among other methods. The New York Times has documented methods such as wireless key emulation devices and “power amplifiers” that increase the range of the wireless signal looking for the entry credentials. If the owner is in a house or other location close to the car, criminals can then gain entry when their wireless fob responds.6
- Mobile application security: As more automobile manufacturers release mobile applications that communicate with cars, mobile applications are quickly becoming a major target for malicious behavior. One example of a flaw in a mobile application happened when Nissan had to pull its NissanConnect EV application for the Nissan Leaf.7 The poor security of the application allowed security researchers to connect to the Leaf via the Internet and remotely turn on the car’s heated seating, heated steering wheel, fans and air conditioning. In an electric car, this meant the possibility a malicious actor could drain the battery of an unsuspecting owner. Mobile applications themselves can be vulnerable in a number of ways. According to Gartner, 75% of mobile applications would fail basic security tests.8 Mobile operating systems themselves are a source of concern—over the last four years, there has been a 188% increase in the number of Android vulnerabilities and a 262% increase in the number of iOS vulnerabilities.9
Gains of up to 403% from our Free Newsletter.
Here are sample stock gains from the I/O Fund’s newsletter --- produced weekly and all for free!
+344% on Nvidia
+403% on Bitcoin
+218% on Roku
*as of March 15, 2022
Our newsletter provides an edge in the world’s most valuable industry – technology. Due to the enormous gains from this particular industry, we think it’s essential that every stock investor have a credible source who specializes in tech. Subscribe for Free Weekly Analysis on the Best Tech Stocks.
If you are a more serious investor, we have a premium service that offers lower entries and real-time trade alerts. Sample returns on the premium site include 324% on Zoom, 601% on Nvidia, 445% on Bitcoin, and 4-digits on an alt-coin. The I/O Fund is audited annually to prove it’s one of the best performing Funds on the market with returns that beat Wall Street funds.
More To Explore
Newsletter
Google Stock: Search Is On The Precipice Of Multi-Decade Disruption
Earlier this month, Google’s stock (Alphabet) tumbled 7% when chatbot Bard was unable to complete a search with 100% accuracy. During a demonstration, Bard returned incorrect information about which t
Nvidia Throwback: An Example of Why Conviction Matters for Stocks
Last August, Nvidia had a $2.5 billion revenue miss due to gaming and crypto mining related weakness. This caused the stock to selloff (8%) in one day. Many pundits were questioning if Nvidia could ov
Timeout for Tesla Stock: Where We Plan to Buy
The stakes are high for Tesla's stock because if the margins remain healthy, the stock will do quite well. However, if the margins contract, then the bears will be in control. This is a big moment fo
Bitcoin is up 40% in 2023, Here’s Where it Goes Next
We update the new developments in Bitcoin’s price patterns as well as the on-chain metrics that we tend to see around historic lows. We will also take a look at the fundamental thesis surrounding Bitc
Ad Budgets Set To Slow Even More In 2023
Ad-tech stocks across the board had a tough year last year. Investors are hoping that 2023 will be a better year, yet according to the projected ad spend for 2023, this may not be the case.
VIDEO: January Stock Market Correction Explained
In late November, we warned our readers that December could be a volatile month. The recent bounce in January also provided some warning signs, which we used to get defensive.
Interview with Real Vision: Nvidia is the #1 AI Stock and Why Cloud Looks Weak
Last week, I joined Samuel Burke from Real Vision to discuss “3 Ideas.” We discussed why I see Nvidia as the #1 AI stock also why cloud is weaker than it appears.
Top 5 Stocks Of 2022: Year In Review
In this analysis, rather than prognosticate on the top stocks of 2023, we think it’s more productive to go back and review the stocks that performed well under new macro conditions in 2022. This exerc
CrowdStrike Stock: Cloud Darling Reports Weak Sequential Key Metrics
CrowdStrike has one of the better fundamental profiles out of the cloud category. This is due to its 50%+ revenue growth rate, GAAP operating margin of (7%) and free cash flow margin of 31%. The compa
One More Rally to End the Year
Sentiment continues to show some of the most bearish readings we’ve seen since the 2022 bear market began. The AAII, which is a survey that asks investors if they are bullish, neutral or bearish 6 mon