An attacker installs a new firmware that grants him more rights on the systems.
Attackers leveraging cyber vulnerabilities to bypass security measures and steal the vehicle, which can be applicable to both vehicles and specialized rail equipment.
Attackers manipulate the vehicle's odometer readings, typically to reduce the displayed mileage, affecting the vehicle's resale value and potentially misleading buyers about its usage history.
This refers to the modification of the ECU to enhance a vehicle's performance, potentially compromising safety standards and regulatory compliances.
Attackers unlock features that are typically behind a paywall or not activated, such as advanced navigation systems or entertainment features, without proper authorization.
Attackers seize control of specific vehicle functions, overriding operator inputs. In the rail context, this could mean unauthorized control of train speeds, while in cars, it might involve steering or acceleration.
Attackers obscure or manipulate the data presented to vehicle operators or sensors, potentially causing misjudgments. For instance, altering camera feeds or sensor data can mislead a train conductor or autonomous car system.
Attackers disrupting a vehicle's control systems, preventing operators or automated systems from making desired actions, critical in scenarios like emergency braking in both automotive and rail contexts.
An attacker can completely disable brakes of the vehicle by manipulation.