September 9, 2015 By Shane Schick 2 min read

You might assume a self-driving car would be so sophisticated as to be unhackable, but a security researcher has shown it could cost little more than $60 to manipulate an autonomous vehicle in dangerous ways.

The Guardian described an upcoming presentation at the Black Hat Europe security conference where consultant Jonathan Petit will demonstrate the attack. Using just a makeshift laser pointer, the technique involves duping a self-driving car’s lidar, the laser ranging systems that help the cars see what’s around them. Petit’s paper suggested attackers would not need advanced equipment to trick autonomous vehicles into seeing another car or person. An Arduino or Raspberri Pi computer would work for attacks of up to 100 meters in range.

Petit, formerly a fellow from the University of Cork’s Computer Security Group in Ireland, told IEEE Spectrum that the lidar represents a high-risk area of vulnerability since the sensory input it provides is essential to a self-driving car. His research showed that cybercriminals would be able to conduct denial-of-service attacks specific to autonomous vehicles. Even vehicles operated by human beings might prove equally susceptible to phony images interfering with tools such as driver assistance programs.

The ability to attack a self-driving car comes as automakers grapple with a delicate balance between integrating more technology-driven functions and ensuring drivers and passengers don’t fall victim to attackers. As Silicon Republic pointed out, Chrysler is just one of the major manufacturers to recall thousands of vehicles over potentially risky software updates or vulnerabilities in radio equipment.

Of course, some people may not need the threat of cyberattacks to be put off by the notion of a self-driving car. ITProPortal mentioned that Petit’s research only builds upon questions about the basic operating performance of autonomous vehicles after early models created by Google and Delphi came close to crashing during testing.

The same story noted that BT has set up a team of ethical hackers to try to detect more nefarious ways to tamper with cars that drive themselves — though they may not have orignally thought about the risks of a laser pointer.

More from

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today