Collateral damage of automotive cyberattacks could be severe
The automotive supply chain is susceptible to cyberattacks due to its inherent safety and reliability requirements, as well the range of data acquired from a layered network of OEMs with each one bringing different components, Clara Wood, automotive research leader at Kaspersky, tells CSO. “The sheer number of components talking to each other can provide an entry point if not properly protected. Any disruption or compromise of the supply chain can have severe consequences, but in the case of vehicles, the potential collateral damage could be very severe, including loss of life.”
As the sector rapidly evolves with the introduction of cutting-edge features and services such as autonomous driving, connected vehicles, electric vehicles, and shared mobility, it is likely to become a playground for malicious actors, Wood says. “Their motivations are likely to vary, encompassing financial gain through tactics like ransomware and IP theft, disruptive attacks, or even cyberattacks driven purely by malevolent intent.”
Securing automotive supply chain demands a layered, comprehensive approach
Securing the automotive supply chain in the modern digital landscape demands a layered, comprehensive approach, Wood says. “In the past, companies typically focused on protecting their immediate systems and networks. However, with the proliferation of connected devices and digital communication, this approach is no longer sufficient.”
Cybersecurity should be seamlessly integrated into all aspects of operations, in a collaborative manner where all suppliers, partners, and stakeholders share the same definition of cyber risk and are on the same page to ensure they all adhere to the highest cybersecurity standards, she adds. “An attack can start at any point in the chain from any supplier, however small, therefore proactively scrutinizing the partner network is absolutely crucial.”
Training and awareness programs are vital to ensure that everyone in the organization, as well as external partners, understands cybersecurity best practices. In addition, tailored threat intelligence reports can provide valuable insights into emerging threats from the dark web and trends specific to the automotive industry, enabling SOCs to protect their networks more effectively. “At the basic level, there is no replacement for patch management, network segmentation, and regular security assessments to set the foundation of a solid cybersecurity strategy,” Wood says. “This can be then fortified with continuous monitoring of the supply chain and having a well-defined incident response plan to react swiftly and effectively in the event of a security breach.”