Researchers and experts are quoted without their backgrounds being checked. It's pc world, not pc magazine. Long ago when I read these mags, pc world was typically sub par to pc magazine and a few others. This article is quite laughable.
Researcher: Hackers could start abusing electric car chargers to cripple the grid
Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box conference in Amsterdam on Thursday.
While electric cars and EV charging systems are still in their infancy, they could become a more common way to travel within the next 10 years. If that happens, it is important that the charging systems popping up in cities around the world are secure in order to prevent attackers from accessing and tempering with them, said Ofer Shezaf, product manager security solutions at HP ArcSight. At the moment, they are not secure at all, he said.
An EV charging station like this one in Amsterdam could be vulnerable to hackers, according to a security researcher at the Hack in the Box conference.
“Essentially a charging station is a computer on the street,” Shezaf said. “And it is not just a computer on the street but it is also a network on the street.”
Users want their cars to charge as quickly as possible but not all electric cars can be charged at once because the providers of charging stations have to take the local and regional circuit capacity in mind, said Shezaf. “Therefore we need smart charging,” he said.
But installing smart charging systems means that the charging stations on the street need to be connected, so the amount of energy is distributed in such a way that electricity grids are not overloaded, he said. But when charging stations are connected, multiple charging stations can be abused if an hacker can access them, Shezaf said.
The easiest way is to physically access the charging stations. “There are systems on the street and it is very easy to access the computer,” Shezaf said. “When you get to the equipment, reverse engineering it is actually a lot easier than you think.”
Hackers could take apart the systems to determine components and analyze and debug the firmware, he said. By doing this they can potentially spot convenient eavesdropping points and get encryption keys, Shezaf said, who added that he based his research on public sources, and in most cases on documentation from vendors’ websites.
Charging stations can be configured by opening them, placing a manual electric DIP switch to configuration mode, connecting an Ethernet cross cable and firing up a browser to get access to the configuration environment, he said. In at least one type of charging station this kind of access doesn’t require any authentication, Shezaf found. “You go and open the box with a key and that is the last security measure you meet,” he said.
Some charging stations are also connected using RS-485 short-range communications networks used for inexpensive local networking, Shezaf said. Those connections have a very low bandwidth and high latency, are commonly used and have no inherent security, he added.
And while it all depends on the application, bandwidth and latency limits of the RS-485 networks makes eavesdropping and man-in-the-middle attacks simple, according to Shezaf, who described several other potential vulnerabilities during his presentation.
Using these methods, hackers could start influencing charge planning or influence and stop charges, he said. If no electric car can charge for a day when 30 percent of all cars in a country are electric, this could become problematic, he said. “If someone can prevent charging for everyone in a small area you have a major influence on life. In a larger area it might be a really really big problem,” Shezaf said.
“If somebody finds a way to confuse the smart car charging system, the denial of service can not only hit charging cars, but also the electricity system,” he said.
While risks may be small today, it is time to start securing charging systems, Shezaf said. There should be more standardization in the charging sector, preferably using open standards, he said. But basically “we just have to pay more attention and spend more money,” he said, adding that at the moment too little of both is happening.
“We shouldn’t be relaxing now. The issues will become real when electric cars become real. If we don’t start today it won’t be secure in 10 years,” he said.
http://www.pcworld.com/article/2033826/hackers-could-start-abusing-electric-car-chargers-to-cripple-the-grid-researcher-says.html
I'll admit it. I didn't read the entire article. I couldn't stop laughing after reading the word "tempering." I guess tampering and tempering sound the same to the Dutch ear..While electric cars and EV charging systems are still in their infancy, they could become a more common way to travel within the next 10 years. If that happens, it is important that the charging systems popping up in cities around the world are secure in order to prevent attackers from accessing and tempering with them, said Ofer Shezaf, product manager security solutions at HP ArcSight. At the moment, they are not secure at all, he said
Actually, New York was a Dutch colony.I'll admit it. I didn't read the entire article. I couldn't stop laughing after reading the word "tempering." I guess tampering and tempering sound the same to the Dutch ear.Just like you're and your, then and than and many others I read from New Englanders. Hmmm.. New York was a Dutch colony....right?
True.Actually, New York was a Dutch colony.
There is an important norm on the Internet not to pick on minor spelling and grammar errors. Just because you didn't ace English class doesn't mean your opinion is worth less.
You are so right about charging at home. I have been using 110V/120V at home using a 50' 12 gage outdoor cord for over a year. Plugging in at work, L1 by day. So costs me about $15.00 US Dollars a month to drive my lease allowed 1,250 miles a month.i was looking at the news on this hack conference. one said he could hijack any airliner from the internet through its autopilot. he only forgot there are two people flying that thing that can disengage the autopilot and fly manually as soon as something don't look right. +90% of charging is done at home without any fancy commercial grade internet connected charger (dumb car chargers?) making this another almost non-issue issue. the same train of thought would have you believe the hackers could reprogram everybodys clothes dryers to burn all the clothes and everyone would be forced to walk around naked.
you are right that anybody that believes half of what comes out of this conference needs more tin foil under their hats.
Up here in BC we've got Itron OpenWay meters. The "standard" 200A 120/240V meters do have an internal disconnect feature (Itron C2SOD) however these are only used for homes and small businesses. Any buildings (commercial or otherwise) served by more than 200A or with 3-phase power use different models of smart meters that don't have the ability to disconnect the service.Hey if they can knock out power to sections of town (lots of business's have smart meters). They could just turn off gas stations.
You're completely right if we're talking about posts but here we're talking about an article. Completely different standard. An online article should be held to the same standards as what you'd find in print.There is an important norm on the Internet not to pick on minor spelling and grammar errors. Just because you didn't ace English class doesn't mean your opinion is worth less.
How do I read the model number on this Itron? Is it just a CL200?Up here in BC we've got Itron OpenWay meters. The "standard" 200A 120/240V meters do have an internal disconnect feature (Itron C2SOD) however these are only used for homes and small businesses. Any buildings (commercial or otherwise) served by more than 200A or with 3-phase power use different models of smart meters that don't have the ability to disconnect the service.