Press Release

Automotive cyber incidents doubled in 2019, reaching 188 vulnerabilities

According to Upstream Security Ltd. report, automotive hacking incidents more than doubled in 2019 compared to the data of 2018.

Data reveals that from 2016 to 2019, the number of automotive hacking incidents increased more than 7 times. Last year alone, the number of cyber incidents jumped by nearly 138%.

Rachel Welch, COO of Atlas VPN shares her concerns on the automotive cyber incidents:

“Keyless go, remote start, remote shut down, mobile vehicle applications, all of these technologies can become attack vectors. Automotive cyber attacks can be seen as more dangerous than attacks on computer devices since they can physically endanger the victim.”

Cyber-attacks focus on car theft

Connected vehicles have many attack vectors, but some are more common than others.

Almost one-third of hacking incidents in the past 10-years involved criminals stealing the car or breaking into the car and stealing equipment from inside the vehicle.

Researchers in January 2019 proved the fact that keyless entry is a huge vulnerability for most manufacturers.

The findings showed that 99% of brands using keyless systems were prone to get hacked. They tested 237 keyless entry car models and found that 230 of them could be hacked within a few minutes.

A close second attack vector is control over car systems, with over 27.22% of all successful attack volume. When a hacker gains control over a server, it allows the criminal to access certain functionality within the connected vehicle.

Cybercriminals can unlock the car and start or kill the engine after gaining access to the car’s systems. Simultaneously, if the system is advanced enough, hackers could disable the brakes while the vehicle is in motion. Due to these reasons, this hacking method is the most dangerous to the victims.To read the full article, head over to:

Disclaimer: The story is in the form of a Press Release and has not been edited or reviewed for language or content. The content is published in the form that it was received by the editors after removing certain personal information such as contact numbers and emails. is not responsible for the veracity of this content

Leave a Response