Upstream: Auto Industry Cyber Attacks RisingUpstream: Auto Industry Cyber Attacks Rising
Cybersecurity firm Upstream, which specializes in the auto industry, says cyberattacks are growing as more software-laden vehicles and electric-vehicle charging stations proliferate, expanding opportunities for bad actors trying to profit from ransomware.
![](https://eu-images.contentstack.com/v3/assets/blt7121b6ec5c11097b/blt8a97cbba25aeefdc/67acc4382ba6116b4486675c/Cyber_20crime_20(Getty).jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
A leading cybersecurity firm says cyberattacks on the auto industry – from vehicles to electric-vehicle chargers, dealers, automakers and parts makers – are impacting millions of mobility assets.
Upstream, based in Ann Arbor, MI, issuing its annual report on cybersecurity, says massive-scale incidents soared from 5% in 2023 to 19% in 2024.
The rise of software-defined and autonomous vehicles has introduced new vulnerabilities, says Upstream, leading to a widening cybersecurity gap. Additionally, critical infrastructure in smart mobility devices, like EV chargers and fleet management systems, has expanded the attack surface available to hackers. Mobility-specific ransomware attacks surged in 2024, causing unprecedented disruptions with 108 reported ransom attacks and 214 data breaches.
One of the most serious incidents was a June ransomware attack on CDK Global, a leading U.S.-based software provider used by 15,000 automotive dealerships, which halted operations for nearly three weeks, causing losses estimated at $1.02 billion.
“The cybersecurity landscape across the Automotive and Smart Mobility ecosystem is poised to become more complex than ever,” says Yoav Levy, CEO and co-founder of Upstream. “Cyber threats are evolving faster than the industry is prepared to handle, outpacing regulation-driven measures. Threat actors have already shifted toward large-scale, sophisticated and AI-powered attack methods, targeting not only vehicles but also interconnected systems such as EV charging infrastructure, API (Application Programming Interface)-driven apps and smart mobility IoT devices. This growing attack surface demands a transformative and proactive approach to cybersecurity.”
According to Upstream, 65% of publicly reported cyber-incidents were carried out by “black hat actors with malicious intent.” Ninety-two percent of attacks were executed remotely and of those, 85% were long-range and did not require any physical proximity to the target, says Upstream. The ecosystem, the firm reports, experienced a significant surge in telematics and application server attacks in 2024 – 43% of incidents in 2023 rising to 66% in 2024.
The compromise of individual vehicles where hackers took control of vehicle systems increased dramatically in 2024, accounting for over 35% of incidents.
Some examples of hacking incidents in 2024 that have the industry investing more in cyber security:
In early 2024, a significant cyberattack targeted the communication backbone between EV chargers and Charge Point Operator (CPO) management systems. This breach exposed vulnerabilities in the communication protocols, allowing attackers to remotely stop charging sessions, install malicious firmware and impose unauthorized tariffs on users. The incident underscored the critical need for enhanced cybersecurity measures within EV charging networks.
In October 2024, AutoNation, a major automotive retailer, reported a data breach resulting from the earlier cyberattack on CDK Global, a software provider for car dealerships. The breach led to disruptions in vehicle sales, financing, insurance and repair services, significantly impacting AutoNation's operations and financial performance.
In late 2024, owners of BYD electric vehicles in Australia raised concerns about potential eavesdropping capabilities. They discovered that the cars' internal SIM cards could be dialed by an external party, allowing audio from inside the vehicles to be transmitted without the drivers' knowledge. This issue highlighted vulnerabilities in vehicle communication systems and raised significant privacy concerns.
Throughout 2024, multiple reports identified vulnerabilities in EV charging stations. These included unprotected internet connectivity, insufficient authentication and lack of network segmentation, making them susceptible to cyberattacks. Such vulnerabilities could allow hackers to tamper with charging stations, potentially disrupting services and compromising user data.
In late 2024, a vulnerability in Volkswagen's software exposed the location data of approximately 800,000 EVs. This flaw allowed potential attackers to track drivers' precise movements and access personal information such as emails, phone numbers and addresses.
Security researchers discovered a significant flaw in Kia's web portal that allowed hackers to remotely access and control millions of vehicles. By exploiting this vulnerability, attackers could unlock cars, start engines and track vehicle locations. Kia promptly patched the bug after being informed by the researchers.
About the Author
You May Also Like