As connected vehicles become increasingly prevalent, the automotive industry faces unprecedented cyber security challenges. To understand the damage that can be wrought by cyber criminals, we need only look at examples of supply chain attacks over recent years, including automotive component suppliers, a global automotive logistics and shipping company, and even a South African rail, port and pipeline company.
In response, the United Nations Regulation No. 155 (UN R155) has been established to set a global cyber security standard for the entire automotive value chain, extending beyond the vehicle itself. It mandates comprehensive security practices across development, manufacturing and distribution, requiring all stakeholders to uphold stringent protection measures.
Key focus areas under UN R155 include:
- Supply chain security: Protecting against vulnerabilities introduced by third-party suppliers and partners through remote access to software, programmable logic controllers (PLCs), robots, controllers, monitoring devices and more.
- Data privacy: Ensuring the confidentiality, integrity and availability of sensitive vehicle data shared, from component suppliers all the way through to dealerships and customers.
- Incident response: Developing effective plans to detect, contain and mitigate cyber security incidents that are managed in accordance with the Trusted Information Security Assessment Exchange (TISAX), an assessment and exchange mechanism for information security in the automotive industry, UN R155 and IEC 62443 cyber security best practice controls and frameworks.
- Continuous monitoring: Implementing ongoing security assessments and threat intelligence on IT and operational technology (OT) systems.
Attacks from all angles
Attacks within the auto supply chain space can originate from multiple angles. These could include electrical distribution, generation and transmission; water or gas supplies; component suppliers; port, harbour or rail disruptions; logistics operation companies working inside the factory; or shop floor programmable logic controller (PLC) equipment OEM breaches.
Using non-secured component suppliers can result in several risky, complex scenarios. For instance, with geopolitical tensions on the rise, manufacturing is disproportionally affected by ‘accidental’ ransomware that is deployed from IT or contractors’ laptops, USBs or internet access. Here, a supplier's IT systems could be compromised by a ransomware attack, encrypting their data and demanding a ransom payment. The result is that the supplier's operations are disrupted, leading to delays in component delivery, potential data breaches and financial losses.
Another conceivable scenario is that of a supply chain phishing attack, where phishing e-mails are sent to employees at various levels of the supply chain, targeting sensitive information like login credentials or financial data. Compromised credentials could be used to gain unauthorised access to systems, disrupt operations or steal valuable data.
Additionally, botnet-enabled distributed denial of service (DDOS) attacks, which are used to launch attacks on suppliers' websites or IT infrastructure, should be of concern. The impact of this type of incident is that attacks can not only overwhelm systems and disrupt operations, but also cause incredible reputational damage.
Another possible situation could be the targeting of suppliers to steal sensitive intellectual property related to vehicle design, manufacturing processes or software, which can lead to competitive disadvantages, financial losses and even legal consequences. By the same token, stolen sensitive customer data, such as personal information or financial details, can result in identity theft, financial fraud and damage to the supplier's and manufacturer's reputations.
Industrial espionage is another significant danger – cyber criminals could target suppliers to gain access to confidential information about vehicle development, manufacturing processes or supply chain vulnerabilities, which can then be used to gain competitive advantage, disrupt operations or even be sold on the black market.
Finally, it’s critical to take measures to protect against supply chain malware attacks. Under these circumstances, malware could be introduced into the supply chain through compromised components or software, targeting vehicle systems or manufacturing equipment, thereby disrupting operations, compromising vehicle security and leading to potential safety risks.
What can local automotive organisations do to increase protection?
To strengthen cyber security and comply with TISAX and UNECE standards, South African automotive organisations should begin with a comprehensive risk assessment to pinpoint vulnerabilities. Datacentrix recommends adopting advanced cyber security technologies for OT, procurement and dealership protection, alongside regular workforce training, including non-IT employees, on security best practices.
It’s also possible to perform offline cyber audits for new equipment, where shop floor equipment can be scanned at staging or pre-production planning and certified as virus, malware and configuration risk free at that time and place. Furthermore, PLC code protection offers advanced PLC versioning, code management, code backup and function block level deployment services. This removes IP from engineering workstations and puts code in secure locations that are easily backed up, restored and documented for compliance and audits.
South Africa has an excellent automotive heritage, but there is still much work to be done to protect these businesses. As a hybrid ICT systems integrator and managed services provider, Datacentrix believes it is our duty to help support companies within the supply chain and ensure that they are better tooled and supported in their fight against cyber-attacks.
For more information on Datacentrix’s automotive IT, OT and supply chain cyber security services, please visit www.datacentrix.co.za.
Share
Datacentrix
Datacentrix provides leading ICT integration services and solutions to South African organisations, ensuring their success and sustainability into the digital age. The company’s approach is to partner with its customers, equipping them with valuable insight and helping to align their ICT undertakings with their business strategy.
Datacentrix offers a deeply specialised skills component and is endorsed by the world’s foremost technology partners. The company is recognised for its agility, in-depth industry knowledge, proven capability, and strong overall performance.
Datacentrix is a Level One (AAA) B-BBEE Contributor, with 135 percent procurement recognition. For more information, please visit www.datacentrix.co.za.