HWG srl
  • Services
    • Cyber defense
      • Security Awareness
      • File Integrity Monitoring
      • Network Security
      • Browser Isolation
      • Email Security
      • Endpoint Security
    • Machine intelligence
      • SIEM
      • EDR
      • SOAR
      • Anomaly Behavior Analysis
      • Cyber Threat Intelligence
      • Deception
      • Threat Data Feeds
      • Vulnerability Management
      • ICS Security
    • Human expertise
      • Security Assessment
      • Incident Response
      • Security Monitoring
      • Threat Hunting
  • About us
  • Blog
  • Resource Center
  • Contacts
  • Careers
  • en
    • it
HWG Incident Response
HWG srl
  • Services
    • Cyber defense
      • Security Awareness
      • File Integrity Monitoring
      • Network Security
      • Browser Isolation
      • Email Security
      • Endpoint Security
    • Machine intelligence
      • SIEM
      • EDR
      • SOAR
      • Anomaly Behavior Analysis
      • Cyber Threat Intelligence
      • Deception
      • Threat Data Feeds
      • Vulnerability Management
      • ICS Security
    • Human expertise
      • Security Assessment
      • Incident Response
      • Security Monitoring
      • Threat Hunting
  • About us
  • Blog
  • Resource Center
  • Contacts
  • Careers
  • en
    • it
HWG srl
HWG Incident Response
  • Services
  • About us
  • Blog
  • Resource Center
  • Contacts
  • en
    • it

Electric mobility: the crucial issue of charging stations

Published by HWG on 21 February 2023

The vast world of the Internet of Things (IoT) offers new solutions every day, ranging various sectors, including the automotive industry, which is investing significant resources to provide increasingly effective solutions to the market. Driven by the need to protect the environment and counter climate change, the automotive industry is constantly focusing on the development of electric vehicles, resulting substantial transformations, especially in the field of energy supply.

The change is taking place in the area of refueling, with the creation of more and more points for electric vehicle charging.

 

Data

According to a survey conducted by Motus-e in January 2022, there were fewer than 250,000 registered electric cars in Italy, just over half of which were so-called 'pure', battery-powered cars. Motus-e reports that at the end of September 2022, there were more than 32,700 recharging stations, with a 32% growth compared to the same period in the previous year.

While these figures are a sign of a thriving and promising sector, they also raise concerns about cybersecurity. Every connected object, every endpoint in the IoT ecosystem is a gateway for cyber criminals to enter the system. There are numerous cases of attacks to steal data and information.

The major risks

Among the criminal episodes that have received the most attention is the one that occurred on the Isle of Wight, England, in the spring of 2022, where pornographic videos appeared on the monitors of three charging stations. Another attack was reported in February of the same year on charging stations along St. Petersburg-Moscow highway, where the charging systems were disabled and insults to Vladimir Putin and messages of support for the Ukrainian troops were displayed.

The media focus stopped at the playful and political aspect of the two incidents, which, however, have more concrete consequences on the lives of users. Taking control of a charging station means being able to violate the user's account and enter the app with which they manage the refueling of their car. Accessing the app means being on their smartphone and accessing all their data. It is not a far-fetched to assume that the user may become a victim of ransomware and be asked to pay a ransom to regain control of the device and its content.

However, it is not only the individual user who is at risk. The other device that can be hacked with an entry from the charging station is the car itself. This leaves the possibility open to attacks on the entire fleet of an electric vehicle manufacturer, with considerable damage. Of course, the risk extends to the energy company that guarantees the supply, which can find itself with entire refueling points blocked, again, by a potentially million-dollar ransomware demand.

The scenario to consider


In an increasingly digital future, where most everyday objects will have software, the issue of cybersecurity is crucial. However, it still remains in the background, especially in sectors where the so-called MVP (Minimal Viable Product) logic is practiced, according to which a device must be developed quickly, put on the market immediately and tested by users. If the response is positive, ongoing integrations are carried out, and only in this phase, cybersecurity is taken into account.

This logic - typical of start-ups - leads to dangerous vulnerabilities, especially when considering what is likely to happen when smart objects are connected to an ultra-performing network such as the 5G network. A network with a young architecture, which in turn will require further development in terms of security.

The data emerging from the research thus outlines a scenario that should not be underestimated, emphasizing once again the imperative of the cybersecurity issue for the automotive sector as well.

 

 

Tags: cyber risk, cyber security, electric mobility, Automotive
Back to Blog

Subscribe to our blog!

Popular post

  • 11 Apr 2022
    HWG appoints Cyber-Industry veterans to its board ...
  • 01 Mar 2022
    Investcorp acquires Italy’s leading cybersecurity ...
  • 16 Feb 2022
    OT Security: how to reconcile business continuity ...
  • 17 Mar 2022
    Security Operation Center (SOC), is it really esse...
  • 09 Feb 2022
    SOC as a service: how to choose the best one

Topics

  • Automotive (1)
  • CEO Fraud (1)
  • Compromise assessment (1)
  • cyber resilience (1)
  • cyber risk (3)
  • cyber security (2)
  • Dark Web (1)
  • electric mobility (1)
  • Incident Response (3)
  • Industry 4.0 (3)
  • IoT (2)
  • operational technology (1)
  • risk assessment (1)
  • security assessment (1)
  • security operation center (1)
  • SOC (3)
  • Spear Phishing (2)
  • Vulnerability Management (1)
  • Zero Trust (1)
see all topics

Related Articles

Cyber security in OT environment: limits and challenges in the "post Covid" era

Can a health emergency impact cyber security management in an OT environment? The answer is yes....
Read More

Threat Hunting: what it takes to hunt down hackers

Usually, in the field of cybersecurity, there are two distinct figures: attackers who try to obtain...
Read More

CEO Fraud: what is it and how to defend yourself

In the last three years, according to the FBI, CEO Fraud attacks have caused companies $26 billion...
Read More
HWG
  • ISO certified company
  • ISO
  • clusit
  • Services
  • About us
  • Blog
  • Resource Center
  • Contacts
HWG Incident Response
2021 © HWG Srl

HWG Srl | Via Enrico Fermi, 15/E - 37135 Verona | P.IVA 03820790230

  • 231/2001 Model
  • Privacy Policy