June 18, 2024, 1:20 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Introduction


We were asked to conduct a black-box assessment of a fleet-sharing Electronic Control Unit (ECU) to evaluate if an attacker could be able to intercept and alter ciphered commands sent over BLE that could lead to an unauthorized access to the vehicle.


Dump all the things


The first step in this kind of assessment is to conduct a hardware analysis of the device to identify the main chips and dump the firmware.


In our case, the core of the …

access assessment attacker ble box commands control disassembler electronic firmware fleet intercept introduction sharing things unauthorized unauthorized access using vehicle

Data Loss Prevention Analyst 1

@ Advanced Energy | Quezon City, 00, PH, n/a

TC-CS-DPP MS Purview-Staff

@ EY | Bengaluru, KA, IN, 560048

Consultant CSIRT Confirmé H/F (Paris)

@ EY | Paris La Défense, FR, 92037

Consultant Azure Cloud Sécurité CSPM H/F (Paris)

@ EY | Paris La Défense, FR, 92037

Consultant en Protection des Données (Microsoft Purview) H/F (Paris)

@ EY | Paris La Défense, FR, 92037

Business Continuity Coordinator

@ Sumitomo Mitsui Banking Corporation | Brea, CA, US, 92821