BLOG

Automotive cybersecurity: risks and precautions with connected cars

automotive cybersecurity

Automotive cybersecurity is an essential topic given the evolution of modern cars, which are becoming veritable computers on wheels. 

With the increasing integration of connectivity technologies, telematics and autonomous systems, the driving experience is being reinvented. However, this revolution brings with it a new and complex layer of risks.

Just like our smartphones and computers, connected cars are vulnerable to cyber attacks. To ignore this reality is to neglect a critical area of security. But what exactly should we keep an eye on in this constantly evolving scenario? Check it out in the next few topics!

What is automotive cybersecurity?

Automotive cybersecurity is the set of practices, systems and strategies aimed at protecting vehicles from digital threats. It involves everything from protecting software and external connections to controlling critical car systems such as brakes, steering and autonomous driving sensors.

With the digitalisation of vehicles, cars are no longer just mechanical machines, they have become interconnected intelligent systems and are therefore vulnerable to the same types of attacks that affect corporate networks, banks and even mobile phones.

Why is automotive cybersecurity crucial for connected cars?

In the past, the biggest security concern in a car was a break-in or theft. Today, with a connected vehicle, a cybercriminal may not even need to touch your car to cause significant damage. The risks go far beyond theft and can directly impact the physical safety of occupants, data privacy and even the reputation of car manufacturers.

Think about it: a connected car has dozens, or even hundreds, of Electronic Control Units (ECUs), which are small computers that manage everything from the engine and brakes to the entertainment system and climate control. 

These ECUs communicate with each other and, increasingly, with the outside world via Wi-Fi, Bluetooth, 5G and other networks. Each connection point is a potential entry point for an attack.

Main attack vectors and vulnerabilities in connected cars

To understand what to look out for, it is essential to know the main targets and methods that cybercriminals can exploit:

1. Infotainment and Connectivity Systems

The system you use to listen to music, navigate and make phone calls is often the most accessible gateway. Vulnerabilities in third-party applications, flaws in the system software or unprotected Bluetooth connections can be exploited to gain access to the rest of the vehicle’s network.

Risks: Invasion of privacy (access to contacts, location history), injection of malware and, in more serious cases, access to critical systems.

2. Mobile Apps and Digital Keys

Many cars offer apps that allow you to remotely start the car, lock/unlock doors and check the fuel level. If the security of these apps is compromised, criminals can take control of the vehicle. Digital keys, stored on smartphones, are also a target.

Risks: Theft of the vehicle, unauthorised access and compromise of personal data.

3. Communication networks (V2V, V2I, V2X)

The cars of the future (and many already present) communicate with other vehicles (Vehicle-to-Vehicle – V2V), with the infrastructure (Vehicle-to-Infrastructure – V2I) and with everything else (Vehicle-to-Everything – V2X). These communications are crucial for road safety and autonomy. An attack on these networks could cause mass accidents or traffic chaos.

Risks: Data interception, injection of false information (phantom traffic), deactivation of safety and traffic control systems.

4. Diagnostic ports (OBD-II)

The OBD-II (On-Board Diagnostics II) port, used by mechanics to diagnose vehicle problems, can be a physical vulnerability if not properly protected. Malicious devices connected to this port can inject code into the car’s system.

Risks: Manipulation of mileage, deactivation of security functions and even theft.

5. over-the-air (OTA) software updates

OTA updates are convenient, but represent a point of vulnerability if the communication channel is not secure. An attacker can inject malicious software into the update process, compromising the vehicle.

Risks: Installation of malware, remote control of the vehicle and data theft.

6. Sensors and Autonomous Systems

Autonomous cars rely heavily on sensors (cameras, radar, lidar) to “see” the environment. Manipulation of these sensors (for example, by obscuring cameras or generating false radar signals) can mislead the autonomous driving system, leading to dangerous decisions.

Risks: Accidents, disorientation of the vehicle and failure of driver assistance systems.

Who should be concerned about automotive cybersecurity?

The digital protection of vehicles is not the sole responsibility of car manufacturers, it also involves drivers and regulatory bodies. Organisations such as UNECE (United Nations Economic Commission for Europe) have already created standards that require the implementation of automotive cybersecurity systems from the design phase to after-sales. 

This standardisation is fundamental to ensuring that all vehicles, regardless of brand or country of origin, offer a minimum level of protection against digital threats.

Automakers and suppliers have a role to play in developing safer vehicles from the ground up, adopting practices such as the Security by Design principle, intrusion testing and regular security audits, secure and authenticated OTA updates, isolation of critical systems – such as brakes, steering and engine – from external networks, as well as an effective vulnerability response plan with quick fixes and clear communication with consumers.

Summary: How can you protect yourself?

✔ Always update your car’s system

 ✔ Use secure networks and avoid public Wi-Fi

 ✔ Don’t install unapproved software or devices

 ✔ Protect your applications with strong passwords

 ✔ Follow digital security news and recalls

 ✔ Demand transparency and accountability from car manufacturers