Car network security "under the city", 7 kinds of attack methods "anti-defense" "GGAI perspective"
Currently, several common attacks in the automotive industry are as follows:
1, direct attack
Their attacks were launched through laptops, cellular networks, scanning nearby connected vehicles, finding vulnerabilities and directly connecting to infotainment systems.
Writing a worm is possible because the vehicle can scan other vulnerable vehicles and the attack does not require user interaction. The worm scans vulnerable vehicles and uses their payload to scan other vulnerable vehicles.
2, virus transmission
Malware can be designed to pass from one car to another. This kind of attack does not directly attack every car, it only infects a small number of cars, allowing malware to spread.
This type of attack can be spread over any number of wireless networks, including cellular networks, Wi-Fi, or using the vehicle-to-vehicle (V2V) technology currently under development.
3, server attack
Networked vehicles exchange data with manufacturers' data centers, including software updates, which is one of the effective ways to put malware into vehicles.
4, hot spot attack
Many connected cars are equipped with Wi-Fi and can be automatically connected to nearby hotspots with familiar names. For example, if you have previously connected a hotspot called "Free Wi-Fi," your car is likely to automatically connect to any hotspot of the same name.
By setting a generic hotspot with a generic name, a hacker might be able to have a range of cars automatically connected to it, at which point the hotspot can upload malware to the car.
Such an attack can spread the virus by turning the wifi of the infected vehicle into an additional malicious hotspot. When a car passes by on the road, malware can spread between cars.
5, production attack
Most automotive parts come from manufacturers around the world, which provides ample opportunity for malware to enter the production process.
This type of malware can be dormant until external activation, such as a signal on a car network connection, causes it to release a fatal effect.
6, application attack
Any "application" you run on your car can be a potential carrier of malware. The application's security vulnerability -- whether accidental or malicious -- allows an attacker to remotely access any vehicle that has the application installed.
This will become more and more common as third-party applications become more popular in the car. We expect this to be a natural evolution of automotive infotainment systems, as mobile operating systems like Android are more widely used in cars.
7, smart phone attack
It has become common to connect your smartphone to your car, usually via Bluetooth, which is a potential carrier of malware.
A widely spread mobile phone virus or malware carried by other mobile phones may not affect the behavior of the mobile phone at all, but it can be paired with the car through the mobile phone and then transferred to the car.