The NHTSA is expected to soon release cybersecurity guidelines to the auto industry Automakers and legislators appear to be coming together on the need for greater cybersecurity for vehicles that are increasingly connected to the internet and controlled by ever-more sophisticated computer systems and software.Volkswagen today announced it will form a cybersecurity company headed by Yuval Diskin, the former head of Israel’s security agency. The company, CyMotive Technologies, will be 40% owned by the German automaker and the rest will be controlled by Diskin and two other former leaders in Israel’s Shin Bet intelligence agency.“The car and the Internet are becoming increasingly integrated. To enable us to tackle the enormous challenges of the next decade, we need to expand our know-how in cyber security in order to systematically advance vehicle cyber security for our customers,” Volkmar Tanneberger, Volkswagen’s head of electrical and electronic development, said in a statement. “CyMotive Technologies provides an excellent platform for doing this. It is a long-term investment in cyber security to make vehicles and their ecosystem more secure.” NHTSALast year, Fiat Chrysler Automobiles (FCA), the world’s seventh largest automaker, issued a recall for for 1.4 million vehicles to fix a software hole that allowed hackers to wirelessly break into some vehicles and electronically control vital functions. Last month, the same hackers who proved FCA’s Jeep Cherokee could be hacked wirelessly demonstrated at the Black Hat conference in Las Vegas that the vehicle’s Controller Area Network (CAN) could also be hacked by physically connecting to the vehicle’s OBD-II diagnostics port.In just nine hours, the hackers proved through a brute-force attack they were able to gain access to and control electronic systems, such as the speedometer, as well as to take control of the vehicle’s steering and brakes using diagnostic messages. Since 1996, all vehicles have come with OBD-II ports. A vehicle’s CAN is the network that connects the dozens of electronic control units (tiny computers) in a modern vehicle.A modern car has dozens of computers with as much as 100 million lines of code — and for every 1,000 lines there are as many as 15 bugs that are potential doors for would-be hackers.Prior to last year’s Jeep Cherokee hack, which was performed by two independent security experts, the auto industry didn’t see an immediate threat, according to Egil Juliussen, director of research at IHS Automotive.“Last year they all got kicked in the butt,” Juliussen said in an earlier interview with Computerworld. “When that happened, then they had a data point around how much it could cost to fix these things — 1.4 million cars that may cost $100, so all of a sudden you’re looking at $140 million to fix that. So that changed how they looked at it.”The Jeep Cherokee was just one of five vehicles identified as “the most” hackable, by PT&C|LWG Forensic Consulting Services, which released their report on cybersecurity last year.Along with the Jeep Cherokee, the report identified the 2014 Infiniti Q50, the 2015 Cadillac Escalade, the 2010 and 2014 Toyota Prius and the 2014 Ford Fusion as the most hackable. Cars with the highest risk of cyber vulnerability, according to the report, tended to have the most features networked together, especially where radio or Wi-Fi networks are connected to physical components of vehicles.By 2020, the number of Internet-connected vehicles will reach 150 million, according to Gartner, and 60% to 75% of them will be capable of consuming, creating and sharing Web-based data.And, by 2035, there will be 21 million autonomous vehicles on roadways, according to research firm IHS Automotive.This week, four Congressional members called for the National Highway Traffic Safety Administration (NHTSA) to lead an industry-wide effort to head off a cybersecurity threat to the increasingly sophisticated and wirelessly connected computer systems in vehicles. The Republican members of the House Energy and Commerce Committee pointed to potentially electronic attacks on the internal networks of automobiles through the use of OBD-II ports and the devices that connect to them.“Researchers have been able to leverage either a direct connection to the OBD-II port, or devices that connect to the port, to cause a range of effects, from nuisances like digitally engaging the windshield wipers or car horn, to more consequential exploits such as remotely unlocking a vehicle’s doors or cutting a vehicle’s brakes or power steering,” the letter stated. PT&C LWG Forensic Consulting Services The 2014 Ford Fusion was selected as being vulnerable because of software flaws that allowed hackers to access vehicle systems from anywhere.In July, Transportation Secretary Anthony Foxx said the NHTSA will soon release cybersecurity guidelines to the auto industry.This week wasn’t the first tine lawmakers called on the NHTSA to address vehicle cybersecurity issues. Last year, the House Energy and Commerce Committee sent a letter to the NHTSA calling on it to “track or evaluate” potential cyber vulnerabilities in wirelessly connected vehicles. The committee also sent a similar letter to all of the major automakers in the U.S.Lawmakers pointed to every increasing numbers of vehicles with Wi-Fi, infotainment systems, over-the-air software upgrades, smartphone interfaces and self-driving features as adding to the number of possible hacker entry points.“We are entering a new era in cybersecurity,” the letter from Committee Chair, Rep. Fred Upton (R-Mich), stated. “The explosion of new, connected devices and services is exacerbating existing cybersecurity challenges. This will be a significant challenge for the automobile industry.”The NHTSA has said vehicle cybersecurity will require a “layered research approach,” which will include legislation, and the auto industry must take “independent steps to help improve the cybersecurity posture.”This year, at the request of the NHTSA the auto industry formed an Information Sharing and Analysis Center (ISAC) to help the industry proactively and uniformly address cybersecurity threats.Sam Abuelsamid, an analyst with Navigant Research, recently co-authored a report on automotive cybersecurity and he said a flurry of companies have sprung up in Israel, including Argus Cyber Security and TowerSec. But not every company is taking the same approach to securing vehicles.For example, Argus offers an intrusion detection and prevention module that ties into a vehicle’s controller area network (CAN), which connects the various electronic control units (ECUs) or computers in a car. TowerSec offers software that is embedded in existing ECUs. Karamba’s software is made to be integrated as part of a vehicle’s original factory setting and is aimed at creating firewalls between ECUs controlling infotainment, telematics and OBD (on-board diagnostics).“Every new vehicle today…has at least some degree of automation capability,” said “Essentially, every vehicle on the road is going to need some aspect of cyber security built into it.” Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Regulation Regulation news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe