Hyundai Joins Fight Against Automotive Hacking

Feb. 20, 2017
Hyundai plans to reinforce its own security system so it can proactively respond to cyber security threats.

Feb. 20, 2017—Hyundai announced it is now member of Auto-ISAC, the Automotive Information Sharing and Analysis Center for automotive cyber security.

Auto-ISAC was a private organization founded in July 2015 by 15 global automakers. It was established to coordinate a joint-industry response to the rise of automotive hacking threats, such as duplicating smart keys and starting cars. Major global automakers, including Hyundai and Kia, have signed up, alongside global automotive suppliers.

The organization's first priority is given to sharing information on vehicle security accidents, both online and offline. It collects cases, analyzes current vulnerabilities and attacks patterns, as well as also devising new solutions. Last July Auto-ISAC disclosed seven guidelines for responding to cyber threats through its website. They included practical contents about risk assessment, and the management, detection of threats, defense against them, and responding to accidents.

The member companies are sharing a variety of information in the cases of vehicle hacking attacks. It has been confirmed that there are cases of remotely accessing the in-vehicle communication system and controlling the transmission, the door lock/unlock and the cluster.

Hyundai said these remote hacking attacks pose an ever greater threat with the increasing prevalence of smart cars and connected cars in the future automotive industry. The combination between automobiles and IT is accelerating, Hyundai said, and inter-vehicular communication and the communication between vehicles and external networks are intensifying. As a result, the targets and scope of cyber-attacks are expanding. Automakers and automotive suppliers are reinforcing technological security from product design.

Hyundai is planning to do its best to reinforce its own security system that can proactively respond to cyber security threats.