Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

How to protect your car from hacking | Kaspersky official blog

0
Medium
Vulnerability
Published: Thu Oct 09 2025 (10/09/2025, 13:31:44 UTC)
Source: Kaspersky Security Blog

Description

We explore cyberthreats facing modern cars, and share practical advice on protecting your vehicle from hacking and theft in 2025.

AI-Powered Analysis

AILast updated: 10/24/2025, 18:36:18 UTC

Technical Analysis

This threat concerns the cybersecurity risks associated with modern connected vehicles, which increasingly rely on complex digital electronics and networked components such as MOST, LIN, CAN buses, OBD ports, Ethernet, GPS, NFC, Wi-Fi, Bluetooth, and LTE. Since the landmark 2015 Jeep Cherokee hack, automotive cyberattacks have evolved from targeting individual vehicles to compromising manufacturers’ backend servers, exposing millions of vehicles simultaneously. The United Nations has introduced regulations (UN R155 and UN R156) and standards like ISO/SAE 21434:2021 to improve automotive cybersecurity, prompting manufacturers to implement segmented network architectures with central gateways to isolate critical systems from exposed modules. Vehicles are categorized into obsolete (no remote risk), legacy (highest risk due to outdated and poorly protected digital systems), and modern (medium risk with improved but not infallible protections). Attack vectors include disabling brakes, triggering distractions, remote tracking, unauthorized engine control, eavesdropping via compromised alarms, and theft of payment data linked to vehicle services. Legacy vehicles are particularly vulnerable due to lack of ongoing security updates and use of third-party infotainment systems. Modern vehicles, while better protected, still face risks from their extensive attack surfaces. Mitigation strategies emphasize strong authentication, disabling unused features, regular software updates, network segmentation, and privacy controls. Fleet operators face elevated risks due to scale and operational impact. The threat landscape is dynamic, with ongoing discovery of new vulnerabilities even in advanced models.

Potential Impact

For European organizations, especially those operating vehicle fleets (e.g., taxis, car-sharing, logistics, construction), the impact includes potential physical harm to drivers and passengers from malicious vehicle control, financial losses from vehicle theft or ransomware attacks, and privacy breaches from stolen telematics and personal data. Automotive manufacturers and suppliers face reputational damage, regulatory penalties, and costly recalls if vulnerabilities are exploited. The compromise of backend servers can lead to large-scale exposure of sensitive customer and operational data. Disruption to transportation infrastructure and services could have broader economic consequences. The integration of payment and subscription services in vehicles introduces additional financial fraud risks. Given the increasing regulatory scrutiny in Europe, non-compliance with cybersecurity standards may result in legal and financial repercussions. The threat also affects individual consumers, who may suffer from tracking, unauthorized vehicle control, or data theft. Overall, the threat undermines trust in connected vehicle technologies and could slow adoption of advanced automotive features.

Mitigation Recommendations

European organizations should implement a multi-layered security approach tailored to automotive environments. This includes: (1) Ensuring vehicles use segmented network architectures with central security gateways to isolate critical systems; (2) Enforcing strong, unique authentication and enabling two-factor authentication for vehicle-related accounts and apps; (3) Regularly applying firmware and software updates promptly, with automated update notifications enabled; (4) Disabling unused telematics, connectivity features, and sensors to reduce attack surface; (5) Encrypting CAN bus messages and securing diagnostic ports against unauthorized access; (6) Conducting regular penetration testing and vulnerability assessments on vehicle systems and backend infrastructure; (7) Implementing strict access controls and monitoring on manufacturer servers and dealer portals to prevent data breaches; (8) Educating fleet operators and drivers on recognizing signs of compromise and incident response procedures; (9) Reviewing and managing paired Bluetooth and Wi-Fi connections to prevent unauthorized device access; (10) Collaborating with automotive cybersecurity standards bodies to ensure compliance with UN R155, UN R156, and ISO/SAE 21434; (11) For fleet operators, integrating vehicle cybersecurity into overall risk management and incident response plans; (12) Encouraging manufacturers to provide transparent information about cybersecurity features and update policies at point of sale.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/automotive-security-2025/54562/","fetched":true,"fetchedAt":"2025-10-09T13:38:18.490Z","wordCount":2053}

Threat ID: 68e7bacaba0e608b4f9be812

Added to database: 10/9/2025, 1:38:18 PM

Last enriched: 10/24/2025, 6:36:18 PM

Last updated: 11/21/2025, 3:08:04 PM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats