Data Insights: Are Electric Vehicles at Risk from Cyber Espionage and Hacking?

Mobile phones and desktop computers have long been targets of cyber espionage, but how vulnerable are electric vehicles?

On Monday, a newspaper reported that a British defense company, engaged with the UK government, advised its staff against connecting mobile devices with Chinese-made electric vehicles due to concerns over potential data extraction by Beijing.

This article examines the security issues related to electric vehicles.


Can an electric car snoop on you?

Security experts quoted by the Guardian suggest that electric vehicles, being the most advanced vehicles on the market, could be vulnerable to hacking.

Rafe Pilling, director of threat intelligence at cybersecurity firm SecureWorks, notes that electric vehicles can produce a wealth of data that could interest a hostile state.

“There are numerous opportunities to compromise these vehicles as they collect data,” he states.

He further explains that WiFi or mobile connectivity can enhance data access for manufacturers through the “over-the-air” software update feature.

“Modern vehicles equipped with over-the-air updates, various sensors, and external cameras could potentially be repurposed as surveillance tools,” he adds.

A mobile phone connected to a car via a charging cable or Bluetooth is another significant data source, he mentions.


Should all car drivers be worried?

Experts indicate that individuals in sensitive sectors, such as government or defense, should exercise caution.

“If you’re working on a sixth-generation fighter jet and connect your work phone to your personal vehicle, be mindful that this connection could compromise your mobile data,” states a researcher at the Royal United Services Institute Think Tank.

Nate Drier, tech lead at cybersecurity firm Sophos, highlights the option to select “don’t trust” when connecting a phone charger to a car; however, this would forfeit many functionalities, such as music streaming or messaging.

“Most people tend to maintain that connection for the convenience it brings,” he acknowledges.

Pilling adds that even rental car users should remain vigilant.

“Generally, individuals may leave copies of their contacts and sensitive information in their car’s entertainment and navigation system, often forgetting to remove them before relinquishing the vehicle, making phone synchronization a risky move,” he advises.


Why are Chinese vehicles the focus of concern?

China is a significant producer of electric vehicles (EVs) through brands like BYD and XPENG. Coupled with the Chinese state’s practices in cyber espionage, this raises concerns. For instance, China’s National Intelligence Act of 2017 mandates all organizations and citizens to “support, assist, and cooperate” with national intelligence efforts.

“Chinese law compels companies to align with national security, so one must consider the possibility of surveillance capabilities in their vehicles,” he notes, albeit admitting that there is “no evidence” currently linking Chinese vehicles to espionage.

Experts believe that while electric vehicles are a concern, devices like mobile phones, smartwatches, and other wearables are more likely targets for spying.


What does the UK government say?

A government representative refrained from commenting on specific security protocols but affirmed that “protecting national security is our utmost priority, and strict procedures are in place to ensure government sites and information are adequately safeguarded.”

A more detailed statement released last month by Defence Minister Koker, indicated that the Ministry of Defence (MOD) is collaborating with other government bodies to understand and mitigate potential security threats from all types of vehicles, not just those manufactured in China.

Further reports state that while there are no overarching policy prohibitions on the movement of Chinese-made vehicles, EVs incorporating Chinese components have been banned from sensitive military locations.

Nevertheless, individual defense entities may impose stricter requirements for vehicles in particular settings.

BYD was reached for commentary, while Xpeng stated it is “committed to upholding and complying with applicable UK and EU privacy laws and regulations.”

SMMT, a trade association representing British automakers, responded:

“Our industry is dedicated to maintaining a high standard of customer data protection, which includes the responsible use of data. Features such as apps and paired phones can be removed from vehicles based on individual manufacturers’ guidelines, ensuring drivers feel secure.”

Source: www.theguardian.com

Wirecutter: The Targeting of undersea data cables for Espionage

U.S. Navy Lt. Cameron Winslow reported that the lead-covered telegraph cable seemed to weigh multiple tons and was difficult to remove from the ocean floor and cut due to unfavorable weather conditions.

“The rough waves caused the heavy boat to collide, shattering the planks and narrowly avoiding being crushed,” he said.

Winslow’s team eventually managed to sever a 46-meter (150-foot) section of the cable using a hacksaw, disrupting enemy communications. This action took place in 1898 during the Cuban campaign of the Spanish-American War. Even over a century later, undersea communication cables remain strategic targets during times of geopolitical tension.

On November 17 and 18 of this year, two undersea fiber optic cables in the Baltic Sea were damaged, possibly due to sabotage, as stated by German Defense Minister Boris Pistorius. Swedish authorities indicated that the Chinese cargo ship Yi Peng 3, in close proximity at the time, was of interest in the cable severing incident.

cable map

The current threats to undersea cables are influenced by geopolitical events such as Russia’s actions in Ukraine, China’s activities with Taiwan, and conflicts like the Israel-Gaza war, all of which have historically been primary targets.

These cables, comparable in thickness to a garden hose when laid deep in the ocean, handle 99% of international telecommunications traffic utilized by individuals, businesses, and governments. There are approximately 530 active undersea cable systems worldwide, covering over 850,000 miles.

A click on the World submarine cable map provides a clear visual representation of global connectivity and susceptibility to disruptions. These cables play a crucial role in facilitating financial transactions, government communications, voice calls, and data transmission over the Internet, amounting to trillions of dollars daily.

Dr. Sidharth Kaushal, a senior fellow at the Royal United Services Institute, emphasized the vital importance of undersea cables to the global economy, making them a prime target for nations seeking to cause unrest.

While deliberate damage to undersea cables can have significant consequences due to the vast amount of global data they transmit, such attacks need to be sustained and public to be truly impactful. Kaushal mentioned that one-off incidents like the Baltic episode can be denied, but the economic threat behind them can still convey a strong diplomatic message.

Leaked documents from Edward Snowden revealed that major telecom companies provided British intelligence access to undersea cables, raising concerns about surveillance. Furthermore, a report by US cybersecurity firm Recorded Future suggested that Russia was closely monitoring its undersea cable system.

In 2015, the New York Times reported aggressive Russian naval activities near an undersea cable running from the North Sea to Northeast Asia, highlighting suspicions of various countries involved in cable disruptions.

Taiwan’s National Board of Audit reported multiple instances where foreign vessels damaged cables linking Taiwan to remote islands, possibly signaling intentional disruptions. These incidents included damage caused by fishing boats, cargo ships, and sand dredgers.

Instances like the ones in Taiwan underscore the potential impact of undersea cable disruptions on daily internet connectivity and communication services, as seen in the slow internet connections and dropped calls resulting from damaged cables.

Yemen’s Houthi rebels denied targeting Red Sea cables after disruptions to major communication networks, adding to the complex landscape of undersea cable incidents.

Recorded Future data shows over 100 undersea cable failures annually, primarily due to accidental damage from activities like fishing and anchoring. Repair costs for undersea cables can be substantial, reaching up to $40,000 per mile, with transatlantic cables costing hundreds of millions to install.

There are concerns of Chinese influence over global undersea cable networks, potentially leading to increased control over data flows. As state actors continue to navigate the delicate balance of causing chaos, the future of undersea cables remains uncertain.

Source: www.theguardian.com

British Military Targeted by North Korea-Backed Cyber Espionage Campaign

State-sponsored hackers from North Korea have initiated an operation to acquire sensitive information regarding nuclear materials, military drones, submarines, and shipbuilding from the United States and Britain. Intelligence agencies have raised alarm about a “global cyber espionage campaign” targeting critical sectors.

A joint notice from the US, UK, and South Korea highlighted that North Korea is utilizing state-sponsored actors to advance its military and nuclear objectives, with Japan and India also on their radar.

These hackers, part of a group known as Andariel, are focusing on military secrets and intellectual property in industries such as nuclear, defense, aerospace, and engineering. They are also attempting to obtain sensitive data from the medical and energy sectors.

Paul Chichester, operations director at the National Cyber Security Centre (NCSC), expressed concern over the extensive cyber espionage campaign orchestrated by North Korean forces in pursuit of their military and nuclear programs.

NCSC revealed that Andariel has successfully breached organizations worldwide and stolen sensitive technical and intellectual property data.

The NCSC believes Andariel is connected to North Korea’s Reconnaissance General Bureau (RGB) and poses a constant threat to critical infrastructure organizations globally.

According to intelligence agencies, Andariel funds its espionage operations through ransomware attacks on the US healthcare sector, using publicly available internet scanning tools to identify vulnerable systems.

Chichester emphasized the necessity for safeguarding sensitive information and intellectual property stored on systems to prevent theft or misuse, urging network defenders to follow the advisory guidelines to prevent malicious activities.

The advisory details how Andariel has transitioned from destructive hacks to conducting professional cyber espionage and ransomware attacks, sometimes targeting the same victims on the same day.

The US State Department has announced a reward for information on Lim Jeong-hyok, an alleged Andariel ally involved in ransomware attacks to fund operations against government agencies and defense companies.

North Korea’s cyber army has been linked to various cyber attacks, including the notorious WannaCry ransomworm in 2017. The attack aimed to obtain valuable information for North Korea and generate revenue for the state through illegal means.

Source: www.theguardian.com

First Glimpse of Call of Duty: Black Ops 6 – 300GB Packed with Espionage, Undead Threats, and Historical Figures

MaMicrosoft didn’t skimp on its Xbox showcase this year. After a string of layoffs and studio closures, the company tried to give gamers what they wanted at its Summer Game Fest on Sunday night, culminating with a 40-minute preview of Call of Duty: Black Ops 6, a massive 300GB download. Continuous online access Even in single-player mode, the textures are streamed from a remote server due to the large amount of textures. As expected, the Xbox version will be available on GamePass from day one, but will not be platform exclusive. The PlayStation version will also be released on the same day, i.e. October 25th.

The game itself is set during the geopolitical turmoil of the early 1990s, including the collapse of the Soviet Union, the Gulf War, and the transition of the US presidency from George Bush to Bill Clinton. As always, the campaign story is an airport-fiction spy thriller, dealing with undeniable CIA operations, covert power struggles, and conspiracies that reach all the way to the very top. Series regular Frank Woods is severely injured and retired from active duty, and is replaced by Troy Marshall, a feckless special forces leader, and Jane Harrow, a shrewd CIA handler. When a mission goes wrong, they are forced to mutiny, recruiting a ragtag team of tech nerds and charming assassins. your Your ass is in danger, sir.

Like most recent Call of Duty titles, Black Ops 6 promises a bit of variety in the way you tackle its campaign missions. Most set pieces, whether they’re set in the glitzy casinos of southern Europe or the tundra of northern Russia, allow for guns blazing attacks or stealth approaches. There are also sequences where players can converse with NPCs to open up new possibilities, such as bribing a senator to grant access to forbidden areas. Familiar faces from the era will make an appearance, including Saddam Hussein, George Bush and Margaret Thatcher, and thankfully Activision has confirmed that at least the latter will be making an appearance. Not a playable option.

Call of Duty titles are typically developed in a quick two years, but with this game, co-developers Treyarch and Raven had double that time. “We had the opportunity to redefine what a Black Ops game is,” says associate design director Matt Scronce. “Every decision we made along the way allowed us to be very deliberate. Previously, each game built on the previous one, but with this game, we really built from the ground up and redefined Black Ops.”

One of the biggest changes to gamefeel is a new system called Omnidirection, which lets players sprint and slide in any direction. “Movement fluidity was a big thing we talked about a lot,” says Yale Miller, Senior Production Director at Treyarch. “That led to a desire to see what we could do.”

One story… Call of Duty: Black Ops 6. Photo: Microsoft

Scrance further explains, “Initially, we tried a 'jug', a quick side step. But when we thought about movement in Black Ops 6, it was all about keeping the player in the flow. It's about fluidity and fidelity, and something like a jug just didn't cut it. So we went back to the drawing board. For over 20 years, Call of Duty has only allowed you to sprint forward. So we looked to the best athletes in the real world: NFL players, NBA players, tennis players — players who can move quickly in all directions.”

Players can now sprint, dive, and slide with 360-degree movement, enabling a wider variety of evasive maneuvers. They can even roll onto their back and under cover, or recreate a classic move from Hong Kong action movies of the time: sliding backwards while shooting forward. Naturally, this system required thousands of new animation frames and motion capture, which wouldn’t have been possible without additional development time.

According to the team, accessibility has also been a key factor. A new intelligent movement system has been introduced, adding crouch, sprint and mantle assist that can be toggled on/off. Players can choose to fully automate jumping over walls and sliding under low obstacles. This was inspired by a variety of games. “We looked at the Forza series with traction control, anti-lock and turn assist,” Scronce said. “Also, mobile games are a good example of this, where you don’t have physical buttons. So what do they do?” The HUD is now also customizable, allowing players to move around on-screen information such as the minimap. This is a feature created with Call of Duty streamers in mind. They often want to add their own camera view in the game and have a hard time deciding where to place it without obscuring important information.

Key multiplayer components have been heavily tweaked, undoing some recent changes. There are 16 new maps, most of which feature the traditional three-lane design, while the Prestige system, which allows seasoned veteran players to show off their prowess with exclusive outfits, accessories, and classified weapons, has returned to the style of previous Black Ops games. Treyarch is also promising a vast arsenal of firearms from the era, with dozens of attachments.

Skip Newsletter Promotions
Call of Duty: Black Ops 6 – Capitol Station. Photo: Microsoft

Meanwhile, the regular Call of Duty zombies mode is returning to its roots, which Treyarch first introduced with World at War back in 2008. While the most recent Modern Warfare title introduced a new type of open-world zombie game, Black Ops 6 returns to the older round-based structure, where players work together to survive wave after wave of the undead while unlocking new weapons and exploring confined environments.

The Call of Duty monster truck continues to roll, accompanied by concerns about the appropriation of recent historical events, the glorification of U.S. foreign policy, and an enthusiasm for military-grade weaponry. But like the best blockbuster war movies, the game has its charms, and Black Ops 6 seems to bring some interesting additions to the series’ atmosphere. Which may point to the benefits of giving the studio a bit more time. Scrance said: “Overall, the extra time allowed us to pay more attention to detail and really push the character fidelity, movement, animations, audio, multiplayer maps, and so on, to a point where we can all say this is the best we’ve ever made.”

Source: www.theguardian.com