JANUARY 24

Welcome to the inaugural newsletter of Enigmatos: Automotive Cybersecurity for Fleets!

Enigmatos is at the forefront of technological innovation has built a technology platform and integrated ecosystem to directly address the multiple challenges in today’s evolving automotive cybersecurity landscape.

Enigmatos’ solution is vital because cyber attacks on automotive fleets result in data breaches, theft of sensitive information, loss of cargo, business disruptions and potentially loss of human lives.

We are thrilled to introduce today the inaugural edition of Enigmatos newsletter. This monthly mailing will provide valuable insights into the automotive cyber world, updates from our company, details on upcoming events we’ll be participating in, and other engaging content. We are excited to share this information with you and keep you informed about the latest developments in our industry.

Amidst the current backdrop of adversity, the Israeli tech ecosystem stands as a testament to resilience, adaptability, and determination. Resilience isn’t just a slogan. It’s the enduring spirit that has made Israeli tech what is today. Challenges may persist, but so does our resolve to serve you, our valued partners, customers, and investors.

Enigmatos delivers, #nomatterwhat.

Yours,

Neta Lempert, CEO

Dangerous vulnerability in fleet management software seemingly ignored by vendor

The critical vulnerability in Digital Communications Technologies’ Syrus4 IoT gateway used by many fleet management systems and exposed in this article is not the first, nor the last one we will discuss here. This vulnerability grants hackers remote access to vehicles, letting them manipulate location data, engine diagnostics, and even shut down engines mid-drive.

This highlights a growing need for robust cyber security in automotive fleets, a concern perfectly addressed by Enigmatos.

Protecting your assets by safeguarding your fleet from cyberattacks allows you preventing operational disruptions, financial losses, and reputational damage. Moreover, ensuring driver safety should be a must, to avoid compromised vehicles in your fleet that can pose a serious threat to driver safety.

We offer you Peace of Mind: With our robust security measures in place, you can focus on your core business operations with confidence, knowing your fleet is protected from the ever-evolving cyber landscape.

Read the full article

TPMS (Tire Pressure Monitoring System) is now a standard feature in most new vehicles, providing an important safety mechanism that alerts drivers when there is insufficient air pressure in their tires. However, this seemingly simple system poses several challenges and security risks that are worth considering.

One of the primary challenges in designing TPMS is achieving a balance between cost-effectiveness, battery life, and interoperability. As the sensor must be wireless due to the rotating nature of the wheel, it relies on radio frequency (RF) transmission to communicate its readings to the vehicle’s ECU (Electronic Control Unit). These sensors, equipped with a battery that may need replacement over time, monitor tire pressure and temperature and transmit this information wirelessly.

The communication protocol used in TPMS is simple and unencrypted to minimize the impact on the sensor’s limited resources. However, this introduces a significant security concern. Since the signals are transmitted and received without encryption, they can be intercepted and manipulated by unauthorized entities.

In fact, this vulnerability allows potential attackers to exploit TPMS for their advantage. Firstly, by setting up a receiving antenna, individuals with malicious intent could track nearby vehicles, monitoring their daily routines and activities within a limited range.

Secondly, the lack of encryption and authentication in the TPMS communication protocol enables impersonation attacks. An attacker could send false messages to the vehicle’s ECU, masquerading as a wheel and triggering warnings about low tire pressure. This type of attack can be executed on a large scale, potentially causing chaos on roads or aiding in targeted criminal activities.

Moreover, the experiment reveals a more significant concern regarding the security of vehicle systems. The wireless entry point provided by TPMS becomes a potential weak link that, if exploited, could lead to unauthorized access and control over the vehicle’s internal network, known as the CAN network. Gaining control over this network could jeopardize critical systems such as steering, propulsion, and braking.

While the real-world impact of such attacks varies depending on specific vehicle models and their security measures, it underscores the need for stronger security practices and protocols in TPMS and beyond. Ensuring the integrity and confidentiality of wireless communications within vehicles is crucial to safeguard against potential threats.

As automotive technology continues to evolve, addressing these security risks is essential to maintain the safety and privacy of vehicle owners. Manufacturers and stakeholders must prioritize the development and implementation of robust and encrypted communication protocols to mitigate the risks associated with TPMS and similar systems.

Stay tuned for an upcoming event where we will showcase the remarkable world of TPMS security, demonstrating the ease with which we can simulate a TPMS hack on a  vehicle. Join us to witness firsthand the ingenuity and skills required to tackle this cyber threat and gain a deeper understanding of the importance of safeguarding vehicles, and the car’s TPMS system in particular.

In the meantime, stay vigilant and safe on the roads!

In today’s data-driven world, automotive telematics has revolutionized fleet management. As telematics companies compete to provide the most comprehensive data insights, Enigmatos takes a unique approach. We go beyond data to deliver reliable information that empowers fleet managers with valuable insights. At the core of our approach lies our robust data fidelity process, ensuring accuracy, completeness, and consistency.

The Distinction: Data vs. Information

Data itself is abundant in the telematics world, with providers boasting expansive datasets. However, the real value lies in transforming this raw data into meaningful information. While others may inundate with data, Enigmatos strives to extract insights that truly matter to fleet managers. Our emphasis is not solely on the quantity of data collected but on the quality of information delivered.

Data Fidelity: The Key to Quality

At Enigmatos, we take meticulous steps to ensure the fidelity of the data we gather. Every data point undergoes rigorous analysis, verification, and cleansing through our cyber-powered algorithms. This process guarantees the accuracy, completeness, and consistency of the data generated. We take pride in the reliability of our data and the trust it instills among our customers.

Translating Data into Valuable Information

Our unique data mining approach enables us to unlock the full potential of the collected data. Utilizing cutting-edge analytics and machine learning algorithms, we extract actionable insights that effectively address fleet management challenges. We delve deeper into the data, identifying patterns, trends, and correlations to provide decision-makers with the information necessary for optimizing fleet operations..

The Enigmatos Example:

Our Fleet Insights Report offers comprehensive and highly informative insights tailored to individual vehicles within the fleet, enabling fleet managers to make data-driven decisions like never before. What sets our report apart is its unique ability to provide accurate and relevant information by comparing specific vehicles to the entire fleet. We go beyond generic fleet-level analysis to deliver insights that truly matter for each vehicle’s performance, efficiency, and maintenance. With our Fleet Insights Report, fleet managers gain the power to optimize operations on a vehicle-by-vehicle basis, unlocking untapped potential and driving success.