Skip to main content

Change can be scary. In the case of electric cars, itā€™s easy to imagine a future in which hackers can have their way with your EVā€”even manipulating how it drives. But the truth is that electric cars are not inherently more vulnerable to hackers than modern internal combustion vehicles. And despite automotive journalistsā€™ best efforts to keep up with this rapidly evolving world of EV cybersecurity, early reporting exaggerates certain risks while failing to cover others.

Are electric cars easier to hack?

No. Electric cars are not inherently easier to hack. Their simple architectures may eventually make them more challenging to hack. But startups have fewer resources to devote to their early EVsā€™ cybersecurity than legacy automakers do.

A finger pressing the enter button on a laptop keyboard, the screen filled with green binary.
Laptop | Jaap Arriens/NurPhoto via Getty Images

Some have argued that electric cars run cybersecurity risks because they have an abundance of computers, receive software updates over wireless networks, and have fully electronic driving controls. But the truth is that almost every modern internal combustion car shares these same features.

When security experts hacked a Tesla to prove it could be done, they went in through the infotainment system. Obviously, they could have attempted the same attack on any modern car, whether an EV or ICE.

In fact, EVs have fewer complex parts and thus may prove less vulnerable in the long run. For example, shutting down a modern vehicleā€™s transmission control unit, engine control unit, or even its electric fuel pump would render it inoperable. But an EVā€™s powertrain consists of an electric motor attached to a battery. Thatā€™s it.

Brandon Barry is the founder and CEO of Block Harbor Cybersecurity which specializes in automobiles and has done extensive hands-on research with EVs. He said, ā€œIn general, EVs are mechanically simpler because they have less moving parts. In many cases, this has allowed automakers to centralize their EVā€™s electronic architecture which can make securing it easier. But make no mistake ā€“ more software and more electronics are entering into all vehicles, electric or not.ā€

Which EVs are the most secure?

You might want to think twice about which EV you choose. Block Harbor bought one of the first Mustang Mach-Es to study an EV that was ā€œrushed to market very quickly.ā€ Barry said, ā€œIn the end, there was nothing that was obviously skipped in the cybersecurity of the vehicle due to the transition to the EV. Ford did a pretty good job at ensuring that that EV inherited a lot of the cybersecurity efforts from the previous vehicles.ā€

A person uses the touchscreen in a Rivian R1T electric vehicle EV.
Rivian R1T touchscreen | Spencer Platt/Getty Images

But vehicles engineered by startups are more concerning. These smaller EV companies donā€™t have the same resources to dedicate to cybersecurity as legacy automakers. In the current industry, getting vehicles to market rapidly is critical to a startupā€™s success.

Barry warns, ā€œThings like cybersecurityā€”that tend to slow down the development process and delivery of those vehiclesā€”can be overlooked.ā€

Can you hack an electric vehicle charging network?

Yes. Hackers have already proven they can break into EV charging stations. Documented attacks only include messing with the display screens, but criminals holding a charging network hostage is a distinct possibility.

A man studies cybersecurity on multiple security screens.
Cyber security expert | Stephen Morton/Bloomberg via Getty Images

In a recent article, the Wall Street Journal speculated that hackers could load malware onto chargers to infect any EVs that plug in. While anything is possible, the Journalā€™s own sources are much more concerned about a different EV cybersecurity threat. The Electric Vehicle Charging Association said, ā€œThe security of our electrical grids is of critical importance as we transition to electric vehicles.ā€ This is because if bad actors could hold a major charger network hostage, the disastrous consequences could be as far-reaching as the oil embargo of the 1970s.

Barry agreed, ā€œIā€™m generally more concerned about the chargers themselves than someone moving laterally into the vehicle.ā€

Is it possible to infect an EV through its charger? Barry added, ā€œThe industry is viewing the charging system as already compromised. And theyā€™re taking very defensive strategies against the charger port.ā€

Should you be concerned about your EV being hacked?

If you choose an automaker with a proven track record of good cybersecurity practices, thereā€™s no reason to suspect your EV will be more vulnerable to a cybersecurity attack than a modern internal combustion car.

Time-lapse photo of man driving his car, the headlights of other vehicles streaking by outside his windshield.
Driving | Samuele Errico via Unsplash

With technology changing rapidly, EV automakers are doing their best to adapt to an evolving cybersecurity landscape. And journalists are doing their best to report on the changes. But we donā€™t always get it right.

The aforementioned Wall Street Journal article states that ā€œan internal-combustion luxury car can have about 150 electronic control units.ā€ It then cites a cybersecurity expert who has no apparent automotive experience saying, ā€œthatā€™s nothing compared to the 3,000 chips that weā€™re seeing in the average EV.ā€ But this wording misses that control units and chips are different things: an EV can also get away with 150 control units while a modern ICE can also have 3,000 chips.

Technical details aside, our tone when discussing such threats is critical. The WSJ article is typical in ending with a quote, ā€œSometimes we need a wake-up call,ā€™ā€™ suggesting things will get worse before they get better.

The less dramatic truth is that the industry does not need a wake-up call. Block Harbor works with multiple OEMs. Barry concluded, ā€œThere are global regulations going into effect that are really setting the bar for what the cybersecurity of vehicles should look like. And thereā€™s not an automaker out there thatā€™s not seriously looking at this, and ensuring that passengers arenā€™t going to be exploited.ā€

In the meantime, we can all seek to educate ourselves on automotive cybersecurity. We can also ask automakers and dealers about the security offered by new ICEs and EVs, sending a clear message that this is an important issue to us drivers.

Next, see our full interview with Brandon Barry, or learn more about how hackers might target charging stations in the video below: