This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Attacking Ground Vehicles with Ransomware: Watch the Horizon
Technical Paper
2022-01-0358
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
Ransomware is not a new method of malware infection. This historically had been experienced in the enterprise in nearly every industry. This has been especially problematic in the medical and manufacturing fields. As the attackers saturate the specifically targeted industries, the attackers will expand their target industries. One of these which has not been significantly explored by the ransomware groups are the embedded systems and automobile environment. This set of targets is massive and provides for a vast attack potential. While this has not experienced this attack methodology at length, the research and efforts are creeping towards this as a natural extension of the business. The research focusses on the history of ransomware, uses in the enterprise, possible attack vectors with ground vehicles, and defenses to be explored and implemented to secure automobiles, fleets, and the industries.
Recommended Content
Authors
Citation
Parker, C., "Attacking Ground Vehicles with Ransomware: Watch the Horizon," SAE Technical Paper 2022-01-0358, 2022, https://doi.org/10.4271/2022-01-0358.Also In
References
- Ng , C.K. and Rajasegarar, s., Pan, L., Jiana, F., & Zhang, L.Y. VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Framework Concurrency and Computation 32 14 2019 1 29 http://dx.doi.org/10.1002/cpe.5726
- Yaqoob , I. , Ahmed , E. , Rehman , M. , Ahmed , A. , Al-garadi , M. , Imran , M. , and Guizani , M. 2017 The Rise of Ransomware and Emerging Security Challenges in the Internet of Things Computer Networks , 129 2 444 458 10.1016/j.comnet.2017.09.003
- Hampton , N. , Baig , Z. , and Zeadally , S. Ransomware Behavioral Analysis on Windows Platforms Journal of Information Security and Applications 40 2018 44 51 http://dx.doi.org/10.1016/j.jisa.2018.02.008
- Cobb , S. 2017 https://www.eset.com/fileadmin/ESET/US/Newsroom/2017/03/ESET_Trends-and-Prediction_2017_Ransomware.pdf
- Thomas , M. Insurance: Challenges to the Business Model JASSA 2 2017 14 21
- Al-rimy , B. , Maarof , M.A. , and Shaid , S.Z. Ransomware Threat Success Factors, Taxonomy, and Countermeasures: A Survey and Research Directions Computers & Security 74 2018 44 168 http://dx.doi.org/10.1016/j.cose.2018.01.001
- Slaby , J.R. n.d. https://www.acronis.com/en-us/articles/ransomware-automotive/
- Weiss , N. , Schroetter , M. , and Hackenberg , R. On Threat Analysis and Risk Estimation of Automotive Ransomware In ACM Computer Science in Cars Symposium 1-9 2019 http://dx.doi.org/10.1145/3359999:3360492
- Sectigo 2019, July 7 https://sectigo.com/resource-library/bad-cars-anatomy-of-a-ransomware-attack
- Cabaj , K. , Gregorczyk , M. , and Maaurczyk , W. Software-Defined Networking-Based Crypto Ransomware Detection Using HTTP Traffic Characteristics Computers and Electrical Engineering 66 2019 353 368 http://dx.doi.org/10.1016/j.compeleceng.2017.10.012
- Suciu , P. 2016, October 26 https://www.caranddriver.com/news/a1544335/
- Bae , S. , Lee , G.B. , and Im , E.G. 2019 Ransomware detection using machine learning algorithms Concurrency and Computation , 32 18 1 11 10.1102/cpe.5422
- Morato , D. , Berrueta , E. , Magana , E. , and Izal , M. Ransomware Early Detection by the Analysis of File Sharing Traffic Journal of Network and Computer Application 124 15 2018 14 32 http://dx.doi.org/10.1016/j.jnca.2018.09.013
- Talib , M.A. , Abbas , S. , Nasir , Q. , and Mowakeh , M.F. Systemic Literature Review on Internet-of-Vehicles Communication Security International Journal of Distributed Sensor Networks 14 2 2018 http://dx.doi.org/10.1177/1550147718815054
- Bajpai , P. , Enbody , R. , and Cheng , B.H.C. Ransomware Targeting Automobiles Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security 23 29 2020 http://dx.doi.org/10.1145/3375706.3380558
- Goud , N. n.d. https://www.cybersecurity-insiders.com/connected-cars-are-culnerable-toransomware-attacks/
- Statistica st th 2020, May 14 https://www.statistca.com/statistics/859950/vehciles-in-operation-by-quarter-united-states/
- Goldberg , J. 2018, April 29 https://blog.guardknox.com/automitve-ransomware-attack-on-car-and-vehicle-fleet
- Wolf , M. , Lambert , R. , Schmidt , A. , and Ederle , T. n.d. https://www.escrypt.com/sites/default/files/documents/Ransomware-against-cars.pdf
- Zhang , T. , Antunes , H. , and Aggarwal , S. Defending Connected Vehicles Against Malware: Challenges and a Solution Framework IEEE Internet of Things Journal 1 1 2014 10 21 http://dx.doi.org/10.1109/JIOT.2014.2302386
- Parker , C. II and Wasen , J. Hypervisor Implementation in Vehicle Networks Detroit, MI WCX SAE World Congress Experience 2020 https://www.sae.org/publications/technical-papers/content/2020-01-1334/