DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

DigitalCIO Bureau by DigitalCIO Bureau
October 31, 2025
in Tech News
0
Cybercrime AI experimentation in the dark web – new Kaspersky study
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

At the Security Analyst Summit 2025, Kaspersky presented the results of a security audit that has exposed a significant security flaw enabling unauthorized access to all connected vehicles of one automotive manufacturer.

By exploiting a zero-day vulnerability in a contractor’s publicly accessible application, it was possible to gain control over the vehicle telematics system, compromising the physical safety of drivers and passengers. For instance, attackers could force gear shifts or turn off the engine when the vehicle is driving. The findings highlight potential cybersecurity weaknesses in the automotive industry, prompting calls for enhanced security measures.

Car manufacturer’s side

The security audit was conducted remotely and targeted the manufacturer’s publicly accessible services and the contractor’s infrastructure. Kaspersky identified several exposed web services. First, through a zero-day SQL injection vulnerability in the wiki application (a web-based platform that allows users to collaboratively create, edit, and manage content), the researchers were able to extract a list of users on the contractor’s side with password hashes, some of which were guessed due to a weak password policy. This breach provided access to the contractor’s issue tracking system (a software tool used to manage and track tasks, bugs, or issues within a project), which contained sensitive configuration details about the manufacturer’s telematics infrastructure, including a file with hashed passwords of users of one of the manufacturer’s vehicle telematics servers. In a modern car, telematics enables the collection, transmission, analysis, and utilization of various data (e.g., speed, geolocation, etc.) from connected vehicles.

Connected vehicle side

On the connected vehicle side, Kaspersky discovered a misconfigured firewall exposing internal servers. Using a previously acquired service account password, the researchers accessed the server’s file system and uncovered credentials for another contractor, granting full control over the telematics infrastructure. Most alarmingly, the researchers discovered a firmware update command that allowed them to upload modified firmware to the Telematics Control Unit (TCU). This provided access to the vehicle’s CAN (Controller Area Network) bus – a system that connects different parts of the vehicle, like the engine and sensors. Afterwards, various other systems were accessed, including the engine, transmission, etc. This enabled potential manipulation of a range of critical vehicle functions, which could endanger driver and passenger safety.

“The security flaws stem from issues that are quite common in the automotive industry: publicly accessible web services, weak passwords, lack of two-factor authentication (2FA), and unencrypted sensitive data storage. This breach demonstrates how a single weak link in a contractor’s infrastructure can cascade into a full compromise of all of the connected vehicles. The automotive industry must prioritize robust cybersecurity practices, especially for third-party systems, to protect drivers and maintain trust in connected vehicle technologies,” comments Artem Zinenko, Head of Kaspersky ICS CERT Vulnerability Research and Assessment.

Kaspersky recommends that contractors restrict internet access to web services via VPN, isolate services from corporate networks, enforce strict password policies, implement 2FA, encrypt sensitive data, and integrate logging with a SIEM system for real-time monitoring.

For the automotive manufacturer, Kaspersky advises restricting telematics platform access from the vehicle network segment, using allowlists for network interactions, disabling SSH password authentication, running services with minimal privileges, and ensuring command authenticity in TCUs, alongside SIEM integration.

 

Tags: Kaspersky
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Akamai and NVIDIA Launch AI Inferencing Platform

by DigitalCIO Bureau
October 31, 2025
0
Akamai and NVIDIA Launch AI Inferencing Platform

Akamai Technologies has launched Akamai Inference Cloud, a platform that redefines where and how AI is used by expanding inference from core data centers to the edge of the...

Read moreDetails

Datamatics Business Solutions Appoints Kartik Nagarajan as CEO

by DigitalCIO Bureau
October 30, 2025
0
Datamatics Business Solutions Appoints Kartik Nagarajan as CEO

Datamatics Business Solutions Ltd (DBSL), a global partner in data-driven marketing, managed outsourcing services for CPA firms and finance and accounting (F&A) solutions, has announced the appointment of Kartik Nagarajan as its Chief...

Read moreDetails

Mphasis Launches Quantum Enhanced optimization Solutions

by DigitalCIO Bureau
October 29, 2025
0
Mphasis Boosts Leadership to Drive European Business and Global Business Process Services

Mphasis has announced the launch of two quantum technology-focused solutions: ·         Mphasis qCryptsec for quantum-safe cryptography to strengthen enterprise resilience o   Mphasis qCryptsec, the Quantum Cryptography solution, reduces risk from cybersecurity threats,...

Read moreDetails

CrowdStrike and NVIDIA Innovate Cybersecurity with ‘Always-On’ AI Agents

by DigitalCIO Bureau
October 29, 2025
0
CrowdStrike to Acquire SaaS Security Provider Adaptive Shield

CrowdStrike has announced it is collaborating with NVIDIA to bring always-on, continuously learning AI agents for cybersecurity to the edge through Charlotte AI AgentWorks, NVIDIA Nemotron open models, NVIDIA NeMo Data Designer synthetic...

Read moreDetails

Mastercard Introduces Threat Intelligence Solution

by DigitalCIO Bureau
October 28, 2025
0
Mastercard Introduces Threat Intelligence Solution

Mastercard has announced Mastercard Threat Intelligence, the first threat intelligence offering applied to payments at scale. The solution brings together Mastercard’s fraud insights and global network visibility with...

Read moreDetails

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Huawei Releases Data Center 2030 Report

CommScope unveils SYSTIMAX 2.0

January 31, 2024

TCS Partners with Extreme Networks

October 26, 2018

Moto Z3 With 5G Moto Mod Launched

August 4, 2018

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope New Relic NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?