{"id":20652,"date":"2018-01-09T09:00:26","date_gmt":"2018-01-09T14:00:26","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=20652"},"modified":"2019-11-15T06:42:34","modified_gmt":"2019-11-15T11:42:34","slug":"electric-cars-charging-problems","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/electric-cars-charging-problems\/20652\/","title":{"rendered":"Don&#8217;t be sure charging your electric car is secure enough"},"content":{"rendered":"<p>During the past five years, electric cars have made an incredible journey, from seeming a bit futuristic and impractical to being something that you want to own. With prices having decreased significantly, the number of electric cars sold hit <a href=\"https:\/\/www.iea.org\/publications\/freepublications\/publication\/GlobalEVOutlook2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">2 million by the beginning of 2017<\/a>, and it is still growing. The infrastructure for electric cars is developing rapidly, so charging stations in your neighborhood don\u2019t look so odd anymore, either.<\/p>\n<p>But, as usually happens with a rapidly developing economic opportunity, manufacturers are jumping into the competition, trying to get as big a piece of the market as they can, and not thinking too hard about what happens next. Of course, we\u2019re talking about security. Not safety, in this case \u2014 an electric charger is unlikely to injure you \u2014 but cybersecurity. Existing implementations of the basic concept \u2014 paying and charging \u2014 aren\u2019t very concerned about the sanctity of your personal data and money. Mathias Dalheimer raised this issue at the <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/34c3\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">thirty-fourth Chaos Communication Congress<\/a>, in his talk about the vulnerabilities of the electric car infrastructure.<\/p>\n<h2>How the charging actually works<\/h2>\n<p>As the number of electric cars grows, so does the number of charging stations, where station providers receive money in exchange for providing energy. For those transactions, they need a built-in billing system. Before you can start charging your car, you need to identify yourself using your charging ID token, a special <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/nfc-near-field-communication\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">near-field-communication (NFC)<\/a> card that is associated with your account.<\/p>\n<p>The billing for electro mobility is normally carried out using the Open Charge Point Protocol, which regulates communications between billing management systems on one end and the electric charging point on the other end. The charging point sends a request identifying you to the billing system; billing management approves the request and lets the charging point know; and the station lets you start charging. Afterwards, the amount of electricity is calculated and sent back to the billing management system so that it can bill you at the end of the month.<\/p>\n<p>Nothing surprising or even really new there, right? Well, let\u2019s take a closer look and see where the problems begin.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/szYeqOIQ9Bw?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h3>Problems, problems everywhere<\/h3>\n<p>Dalheimer probed different components of the system and found that all of them had some problems with security. The first is the ID tokens. They are made by third-party providers and \u2014 surprise! \u2014 most of them do not secure your data. They are very simple NFC cards that do not encrypt your ID or anything else they contain. The cards\u2019 problems continue. First, they\u2019re pretty easy to program, which Mathias demonstrated by copying his own card and successfully charging with the copy. It would be easy for a knowledgeable person to program a bunch of cards, hoping to hit on a working account number. (Mathias didn\u2019t try that, citing ethical reasons.)<\/p>\n<p>Because charging providers bill once per month, if a car owner\u2019s account is compromised in that way, they won\u2019t see that anything is amiss until the monthly bill arrives.<\/p>\n<p>Another shady thing about the procedure: Most stations use the 2012 version of the OCPP protocol, which is already relatively old and is based on HTTP. (We all know what\u2019s wrong with HTTP, which uses no encryption for transactions.) Mathias demonstrated how easy it is to set up a man-in-the-middle attack by relaying the transaction.<\/p>\n<p>Moreover, both stations that Mathias examined had <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/usb-universal-serial-bus\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">USB<\/a> ports. Plug in an empty flash drive \u2013 and logs and configuration data will be copied to the drive. From this data, it\u2019s easy to get the login and the password for the OCPP server and, for good measure, the token numbers of previous users \u2014 which, remember, is all you need to imitate them.<\/p>\n<p>Even worse, if the data on the drive is modified and then the USB drive is inserted back into the charging point, the charging point will automatically update from it and consider the data on the drive its new configuration. And that opens a whole lot of new possibilities to the hackers.<\/p>\n<p>To sum up, criminals can: collect ID card numbers, imitate them and use them for transactions (for which the real account holders will have to pay); rewire charging requests, basically disabling the charging point; gain root access to the station and then do whatever they like. All because providers chose not to care about security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The infrastructure for electric cars is developing, and the number of cars grows rapidly. But do providers even care about security?<\/p>\n","protected":false},"author":2455,"featured_media":20651,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1789],"tags":[2801,2800,2802,97,321,422],"class_list":{"0":"post-20652","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-technology","9":"tag-34c3","10":"tag-ccc","11":"tag-chaos-communication-congress","12":"tag-security-2","13":"tag-technology","14":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/electric-cars-charging-problems\/20652\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/electric-cars-charging-problems\/12127\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/electric-cars-charging-problems\/10092\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/electric-cars-charging-problems\/14357\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/electric-cars-charging-problems\/12586\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/electric-cars-charging-problems\/12289\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/electric-cars-charging-problems\/15096\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/electric-cars-charging-problems\/14892\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/electric-cars-charging-problems\/19460\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/electric-cars-charging-problems\/4618\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/electric-cars-charging-problems\/9898\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/electric-cars-charging-problems\/8744\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/electric-cars-charging-problems\/15615\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/electric-cars-charging-problems\/9146\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/electric-cars-charging-problems\/19232\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/electric-cars-charging-problems\/19325\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/electric-cars-charging-problems\/19313\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/34c3\/","name":"34c3"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2455"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20652"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20652\/revisions"}],"predecessor-version":[{"id":29838,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20652\/revisions\/29838"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20651"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}