1. Knowledge Hub
  2. The newest hack – smart cars

The newest hack – smart cars

September 22, 2015

Vehicle telematics are quickly becoming cyber risk’s newest threat.

Commercial Auto Segment Director, Risk Engineering

As the Commercial Auto Segment Director for Risk Engineering at Zurich in North America, Andy... About this expert

vehicle hacking

In July, WIRED reported that "white-hat" hackers Charlie Miller and Chris Valasek hacked into and took remote control of an operating vehicle via its "infotainment" system. In August, other hackers gained remote entry to another vehicle using a third-party telematics device connected to its OBD II port. Use of these types of telematics devices has become increasingly popular for a variety of reasons ranging from insurance discounts to safety or improved efficiency.

While the WIRED report was alarming because it revealed the vulnerability of the vehicle’s infotainment and critical control systems to hacking, auto manufacturers have well-established recall processes and can move quickly to plug such holes. The newest situation with the third-party telematics device might be even more concerning because of the volume of device manufacturers and service providers. Many may not have the robust testing and recall systems of today’s auto manufacturers.

A vehicle is a mobile network of computers

The design of the Controller Area Network (CAN) in vehicles provides a key challenge for vehicle security. The CAN is an internal vehicle network that allows car components to communicate with each other without a host computer. When this communication system was created, all of those systems were closed and did not communicate outside the vehicle. As manufacturers optimized vehicles to work with smartphones, these internal networks have been opened to outside influence.

Hackers refer to these potential opportunities to access a system as "attack surfaces." Auto manufacturers have been quick to address these security gaps in the wake of the WIRED story. But managers of commercial auto and truck fleets should consider that aftermarket vehicle telematics systems may open additional attack surfaces and take proactive steps to manage this risk.

Strategy for commercial fleet owners

No networked computer system is entirely "hack-proof," as many government agencies and businesses can attest. In most cases, companies accept that the benefits of connectedness outweigh the potential risks. To provide utmost protection, however, defensive strategies must be built into the product development cycle and continually tested and upgraded even after the product is deployed.


As companies consider the benefits of a variety of vehicle telematics systems, a few additional questions in the vendor selection process are warranted:

  1. If the device includes cellular, wireless or Bluetooth communication capabilities, what is the risk analysis process used to design access security into the devices?
  2. Is there an "authentication protocol" that only allows the device to communicate with a trusted source or can anyone with the mobile number or other connection send commands to the device?
  3. What is the risk analysis process used to prevent the telematics device from transmitting commands to the vehicle? (It’s one thing for the device to receive information from the vehicle computer but a whole different challenge when it can send commands back to the vehicle.)
  4. Is message traffic to and from the device and the data stored on the device encrypted so that it cannot be read by others without the encryption key?
  5. How does the telematics vendor conduct ongoing penetration testing for its system?
  6. What is the process to continually update the software on the device as enhancements are made and security holes are closed? (Ideally, this should be over-the-air rather than requiring the vendor to have to install new software on the device manually.)

In this new world of an "Internet of Things" where all sorts of systems will communicate with the outside world, the answers to questions like these provide a sense of how much effort the telematics provider is putting into addressing security issues as a part of their business model. 


The information in this publication was compiled from sources believed to be reliable for informational purposes only. All sample policies and procedures herein should serve as a guideline, which you can use to create your own policies and procedures. We trust that you will customize these samples to reflect your own operations and believe that these samples may serve as a helpful platform for this endeavor. Any and all information contained herein is not intended to constitute advice (particularly not legal advice). Accordingly, persons requiring advice should consult independent advisors when developing programs and policies. We do not guarantee the accuracy of this information or any results and further assume no liability in connection with this publication and sample policies and procedures, including any information, methods or safety suggestions contained herein. We undertake no obligation to publicly update or revise any of this information, whether to reflect new information, future developments, events or circumstances or otherwise. Moreover, Zurich reminds you that this cannot be assumed to contain every acceptable safety and compliance procedure or that additional procedures might not be appropriate under the circumstances. The subject matter of this publication is not tied to any specific insurance product nor will adopting these policies and procedures ensure coverage under any insurance policy.

Comments with LinkedIn

You are logged in as (Logout)

Input is not correct!

0/180