EV Fleets

Super fast EV chargers are used to hack power grids


Fast ev charger is very important to us. Without super fast EV charger, none of these electric vehicles will go very far. So, if we want to use electric vehicles without worry, the quantity and security of fast ev charger are necessary. The freedom of the country road paves the way to new adventures. Imagine cruising the streets in your brand new electric convertible at top speed and the wind blowing all your worries away. Or imagine fleets of electric vehicles traveling hundreds of kilometers and delivering packages to every doorstep. Large and small trucks transport all kinds of products across the road. But none of these electric vehicles will go very far if they can’t be charged at fast, convenient fast EV charger stations.

Broken wire: A threat to fast EV charger stations

Electric Vehicle (EV) battery charging stations present new potential vulnerabilities. As more heavy-duty EVs now use fast chargers, it is possible for an attacker to disrupt the electrical grid by disrupting the charging processes that are taking place.

A combined charging system (CCS) enables super-fast charging. However, the attack called Brokenwire represents a new kind of attack on the CCS. In this attack, the communication between the vehicle and the EV charger is interrupted, which leads to the termination of the charging process. If this changes the power voltage without warning, this can lead to instability of the entire power grid. Imagine if the fast charging of an entire fleet of vans were canceled at the same time. You can learn more about this Joint EVC 33 smart EV Charger

EVC 33 EU( 7KW/22KW )with IEC62196-2, Type 2 Plug&Socket

(Source: jointcharging.com)

Researchers report that switching off numerous chargers at the same time can lead to voltage instabilities that can affect the entire power grid. This could lead to power outages or even cause a fire. The scientists also found out that data can be stolen via the CCS charging system. To launch a brokenwire attack, a malicious actor can use a wireless electromagnetic jamming device from a distance of up to 47 meters, allowing it to safely operate far from the attacked charging station

To minimize this vulnerability to brokenwire attacks, the researchers suggest forcing a secure reboot of the charging system. They also recommend the same processes used in the OT Zero Trust methodology to segment networks and implement secure software patches and firmware updates. Intelligent intrusion prevention systems (IPS) and OT firewalls should be used to set up a trusted network architecture with adaptive trust lists (trust lists) that keep an eye on the situation and only allow trusted traffic between charging stations.

Super fast EV charger is used to hack power grids

(Source: jointcharging.com)


Log4j vulnerabilities affect devices connected to cars, specifically EV chargers, in-vehicle infotainment systems, and digital remote controls used to open doors. V2GInjector is a malware tool designed to invade the V2G (Vehicle-to-Grid) network. It attacks electric cars and charging stations. It can also exploit a cross talk communication leak in the HomePlug Green PHY standard. By exploiting this leak, a malicious actor can launch a man-in-the-middle (MitM) attack, injecting false data in preparation for a deceptive attack.

Secure Shell or web portal attacks for fast EV Charger

Most likely, a malicious cyber attacker will find a way to access the EV charger via Secure Shell (SSH) or web portals, either via web vulnerabilities or via root SSH access with weak passwords [iii] . To ward off these threats, it is best to use strong SSH passwords and SSL/TLS for remote connections.

More to explorer

Leave a Reply

Your email address will not be published. Required fields are marked *

Tell us what you most want to know!

We have a wealth of content about products and the latest news.

* Our team will reply to you in 24 hours.

* Our team will reply to you in 24 hours.