the hackers. And this guide is intended to warn manufacturers

As vehicles become technological gadgets on wheels, hackers they can be very good allies of the manufacturers to detect vulnerabilities. The best example is found in Tesla, which has relied on them on a recurring basis to expose security flaws in the software.

But they can also become a enemy of the connected and autonomous car. In this scenario, the US state agency NHTSA has published a manual of good practices that automakers should follow to prevent hacks.

Vulnerability of car sensors. One of the agency’s main concerns is sensor tampering. The report highlights jamming of Lidar or radar, GPS spoofing, or changing traffic signs and speed limits to trick the system through software attack.

OTA updates. Wireless updates or ‘Over The Air’ are already the norm in the automotive industry, but also a gateway to hackers.

The agency recommends that the manufacturer maintain not only the integrity of crucial vehicle updates – whether remote or not – but also the underlying servers that host the OTA updates, as well as the transmission mechanism between the vehicle and the servers.


Additionally, the NHTSA urges automakers to consider general cybersecurity concerns such as insider threats, man-in-the-middle attacks, protocol vulnerabilities, and compromised servers.

Accessories and spare parts. The best practice guide reminds aftermarket manufacturers that while their devices may not appear to be capable of affecting safety systems, they should be designed with such considerations in mind and should also undergo the same type of safety verification as the vehicles themselves.

Seemingly harmless devices, such as USB adapters or keys that transfer data, or telematics collection devices (such as those used by some insurance companies to reward good drivers), could be used as a proxy for other attacks.

Today’s technology allows anyone without much computer knowledge to break into a vehicle’s system just by changing the code of software updates.

Hyundai Ioniq5

We find an example of this in the CAN Bus (Controller Area Network) system, responsible for sending signals that will control from the infotainment system to the brakes and the steering, which would be at the mercy of the pirate.

Also with a basic kit that is purchased on the internet, they can manipulate the remote controls that open and close the cars.

Source: Motorpasión by

*The article has been translated based on the content of Motorpasión by If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!