DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

DigitalCIO Bureau by DigitalCIO Bureau
October 31, 2025
in Tech News
0
Cybercrime AI experimentation in the dark web – new Kaspersky study
75
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

At the Security Analyst Summit 2025, Kaspersky presented the results of a security audit that has exposed a significant security flaw enabling unauthorized access to all connected vehicles of one automotive manufacturer.

By exploiting a zero-day vulnerability in a contractor’s publicly accessible application, it was possible to gain control over the vehicle telematics system, compromising the physical safety of drivers and passengers. For instance, attackers could force gear shifts or turn off the engine when the vehicle is driving. The findings highlight potential cybersecurity weaknesses in the automotive industry, prompting calls for enhanced security measures.

Car manufacturer’s side

The security audit was conducted remotely and targeted the manufacturer’s publicly accessible services and the contractor’s infrastructure. Kaspersky identified several exposed web services. First, through a zero-day SQL injection vulnerability in the wiki application (a web-based platform that allows users to collaboratively create, edit, and manage content), the researchers were able to extract a list of users on the contractor’s side with password hashes, some of which were guessed due to a weak password policy. This breach provided access to the contractor’s issue tracking system (a software tool used to manage and track tasks, bugs, or issues within a project), which contained sensitive configuration details about the manufacturer’s telematics infrastructure, including a file with hashed passwords of users of one of the manufacturer’s vehicle telematics servers. In a modern car, telematics enables the collection, transmission, analysis, and utilization of various data (e.g., speed, geolocation, etc.) from connected vehicles.

Connected vehicle side

On the connected vehicle side, Kaspersky discovered a misconfigured firewall exposing internal servers. Using a previously acquired service account password, the researchers accessed the server’s file system and uncovered credentials for another contractor, granting full control over the telematics infrastructure. Most alarmingly, the researchers discovered a firmware update command that allowed them to upload modified firmware to the Telematics Control Unit (TCU). This provided access to the vehicle’s CAN (Controller Area Network) bus – a system that connects different parts of the vehicle, like the engine and sensors. Afterwards, various other systems were accessed, including the engine, transmission, etc. This enabled potential manipulation of a range of critical vehicle functions, which could endanger driver and passenger safety.

“The security flaws stem from issues that are quite common in the automotive industry: publicly accessible web services, weak passwords, lack of two-factor authentication (2FA), and unencrypted sensitive data storage. This breach demonstrates how a single weak link in a contractor’s infrastructure can cascade into a full compromise of all of the connected vehicles. The automotive industry must prioritize robust cybersecurity practices, especially for third-party systems, to protect drivers and maintain trust in connected vehicle technologies,” comments Artem Zinenko, Head of Kaspersky ICS CERT Vulnerability Research and Assessment.

Kaspersky recommends that contractors restrict internet access to web services via VPN, isolate services from corporate networks, enforce strict password policies, implement 2FA, encrypt sensitive data, and integrate logging with a SIEM system for real-time monitoring.

For the automotive manufacturer, Kaspersky advises restricting telematics platform access from the vehicle network segment, using allowlists for network interactions, disabling SSH password authentication, running services with minimal privileges, and ensuring command authenticity in TCUs, alongside SIEM integration.

 

Tags: Kaspersky
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Infosys Partners with Harness to Advance AI-Driven Enterprise Transformation and Modernization

by DigitalCIO Bureau
April 10, 2026
0
Infosys Partners with Harness to Advance AI-Driven Enterprise Transformation and Modernization

Infosys and software delivery platform company Harness have announced a strategic collaboration aimed at helping enterprises accelerate transformation and modernization efforts through artificial intelligence-led capabilities. The partnership brings...

Read moreDetails

TCS renews its strategic partnership with Marks and Spencer

by DigitalCIO Bureau
April 10, 2026
0
TCS renews its strategic partnership with Marks and Spencer

Tata Consultancy Services (TCS) announced the renewal of its major, multi year strategic partnership with Marks & Spencer (M&S). This continuing engagement builds on the more than a...

Read moreDetails

Nokia Recognized by GigaOm as “Leader and Outperformer” in Data Center Switching for Fifth Consecutive Year

by DigitalCIO Bureau
April 8, 2026
0
Nokia Recognized by GigaOm as “Leader and Outperformer” in Data Center Switching for Fifth Consecutive Year

Nokia has been recognized by industry research firm GigaOm as a “Leader and Outperformer” in data center switching for the fifth consecutive year, underscoring the company’s strengthening role...

Read moreDetails

New Study Shows an Adaptive Workforce is a Key Characteristic of Top Performing Organizations

by DigitalCIO Bureau
April 8, 2026
0
New Study Shows an Adaptive Workforce is a Key Characteristic of Top Performing Organizations

New research shows that a connected system of workforce intelligence and talent activation yields 11x greater adaptability and 6x higher productivity, with up to 8x stronger financial performance...

Read moreDetails

Tata Play Fiber Collaborates with IBM to Build Next-Gen AI-Ready Data Infrastructure

by DigitalCIO Bureau
April 6, 2026
0
Tata Play Fiber Collaborates with IBM to Build Next-Gen AI-Ready Data Infrastructure

Tata Play Fiber has announced a strategic collaboration with IBM to build a next‑generation, AI‑ready enterprise data lakehouse powered by IBM watsonx. The new platform will unify 25...

Read moreDetails
Next Post
DXC Unveils Xponential to Simplify Large-Scale AI Adoption

DXC Unveils Xponential to Simplify Large-Scale AI Adoption

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Schneider Electric appoints Preeti Gupta Mohanty as CFO for Greater India Zone

February 7, 2024
Fractal unveils intelligent sales agents to accelerate B2B growth

Fractal unveils intelligent sales agents to accelerate B2B growth

March 11, 2026

VMware sees Cloud adoption growing across sectors in India

October 14, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Infosys Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tata Consultancy Services TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?