Attackers using physical media, like USB drives, to introduce or propagate malicious software across vehicle systems. This can exploit maintenance or update procedures where removable media is used.
Attackers can use various remote services to move from asset to asset within the vehicle.
Attackers can exploit vulnerabilities in remote services to move from asset to asset within the vehicle.
Attackers attempt to obtain a list of services running on remote hosts and local network infrastructure devices. Ports, vulnerabilities, cloud services are scanned. The goal is to find these that allow code to be executed remotely.
Attackers probe specific ECU to determine services they offer and their functionalities. By understanding these services, attackers can pinpoint which ECU operations to exploit or manipulate for subsequent attacks.
Attackers identifying and mapping out the ECU within a vehicle's network. Understanding the interconnected ECU can provide insights into potential vulnerabilities and attack vectors.
Attackers target vulnerabilities in the TEE . In vehicles, exploiting TEE can compromise security features designed to protect sensitive data or operations.
Exploiting credentials that are inadequately protected or stored, such as plaintext passwords in vehicle software or rail control systems, allowing unauthorized system access.
Attackers extract authentication credentials, like passwords or tokens, directly from the OS. This could grant unauthorized access to critical systems or software components.
By sniffing a network, an Adversaries can learn more about the vehicle architecture, individual components and their functionality. By sniffing, he can obtain confidential data and access data that will help him to achieve his goals.