Issue No. 1 | November 23′

Dear Reader,

In these challenging times, we stand united against the recent events in Israel and firmly denounce the actions of Hamas. Our hearts go out to the families, friends, and loved ones of the innocent civilians and the soldiers who have tragically lost their lives throughout this war. These attacks against our Nation are truly horrifying, and we stand in solidarity with those affected.
We proudly support our reservist colleagues and all soldiers who have been called to join the army and defend our population. Your bravery and dedication inspire us all. We stand behind you, and we are immensely proud of your commitment to our country.

We are truly grateful for the unwavering support and steadfast solidarity you have shown us. We deeply appreciate it.

On a brighter note, we are thrilled to introduce the inaugural edition of Enigmatos newsletter. This monthly mailing will provide valuable insights into the automotive cyber world, updates from our company, details on upcoming events we’ll be participating in, and other engaging content. We are excited to share this information with you and keep you informed about the latest developments in our industry.

Thank you once again for your continued business support. Together, we will forge ahead and embrace the opportunities that lie ahead.


Neta Lempert, CEO 

Hackers wage cyberwarfare in Middle East

An Israeli-based cyber security firm says hundreds of cyber-attacks are infiltrating government and news agencies in the Middle East – targeting civilians, emergency-alert systems, and in some cases even hacking technology inside people’s homes to terrorize them.

As the conflict between Israel and Hamas continues to escalate, cyber-security experts warn of another war looming on the dark web.

“Cyber warfare is taking a huge part of the overall warfare,” said Gill Messing, the Chief of Staff for Check Point Software, a cyber-security firm based in Tel Aviv.

Messing says he’s tracking more than 40 groups conducting attacks that disrupted more than 80 Israeli websites for both government and news agencies since the start of the war.

Some of the groups that are targeting Israel have a history of targeting the U.S., California, and even parts of the Bay Area. According to Messing, this includes two Russian-based groups called “Anonymous Sudan” and “Killnet” that managed to hack into the systems at the Oakland Airport around six months ago. Now, he says they’re preying on innocent civilians.

According to the company, these groups are trying to take down emergency websites and applications, like Israel’s Red Alert app, that warns civilians about incoming missiles.

In light of recent events and this cyber warfare article, it is crucial to understand that vehicles, whether military or civilian, are prone to cyber threats. At Enigmatos, as an Israeli company specializing in automotive cybersecurity, we understand the importance of protecting vehicles from malicious attacks. Just as government and news agencies in the Middle East are being targeted, it is imperative to acknowledge that vehicles can also be subjected to hacking attempts during times of conflict.

Our solution for vehicle cyber detection offers the necessary protection to safeguard critical transportation assets against cyber threats, ensuring the safety and reliability of these vehicles in the face of evolving cyber warfare strategies. By integrating our cybersecurity solution, you can fortify your vehicles against potential cyberattacks and minimize the risk of compromised systems, enabling secure and uninterrupted operation even in challenging circumstances.

TPMS (Tire Pressure Monitoring System) is now a standard feature in most new vehicles, providing an important safety mechanism that alerts drivers when there is insufficient air pressure in their tires. However, this seemingly simple system poses several challenges and security risks that are worth considering.

One of the primary challenges in designing TPMS is achieving a balance between cost-effectiveness, battery life, and interoperability. As the sensor must be wireless due to the rotating nature of the wheel, it relies on radio frequency (RF) transmission to communicate its readings to the vehicle’s ECU (Electronic Control Unit). These sensors, equipped with a battery that may need replacement over time, monitor tire pressure and temperature and transmit this information wirelessly.

The communication protocol used in TPMS is simple and unencrypted to minimize the impact on the sensor’s limited resources. However, this introduces a significant security concern. Since the signals are transmitted and received without encryption, they can be intercepted and manipulated by unauthorized entities.

In fact, this vulnerability allows potential attackers to exploit TPMS for their advantage. Firstly, by setting up a receiving antenna, individuals with malicious intent could track nearby vehicles, monitoring their daily routines and activities within a limited range.

Secondly, the lack of encryption and authentication in the TPMS communication protocol enables impersonation attacks. An attacker could send false messages to the vehicle’s ECU, masquerading as a wheel and triggering warnings about low tire pressure. This type of attack can be executed on a large scale, potentially causing chaos on roads or aiding in targeted criminal activities.

Moreover, the experiment reveals a more significant concern regarding the security of vehicle systems. The wireless entry point provided by TPMS becomes a potential weak link that, if exploited, could lead to unauthorized access and control over the vehicle’s internal network, known as the CAN network. Gaining control over this network could jeopardize critical systems such as steering, propulsion, and braking.

While the real-world impact of such attacks varies depending on specific vehicle models and their security measures, it underscores the need for stronger security practices and protocols in TPMS and beyond. Ensuring the integrity and confidentiality of wireless communications within vehicles is crucial to safeguard against potential threats.

As automotive technology continues to evolve, addressing these security risks is essential to maintain the safety and privacy of vehicle owners. Manufacturers and stakeholders must prioritize the development and implementation of robust and encrypted communication protocols to mitigate the risks associated with TPMS and similar systems.

Stay tuned for an upcoming event where we will showcase the remarkable world of TPMS security, demonstrating the ease with which we can simulate a TPMS hack on a  vehicle. Join us to witness firsthand the ingenuity and skills required to tackle this cyber threat and gain a deeper understanding of the importance of safeguarding vehicles, and the car’s TPMS system in particular.

In the meantime, stay vigilant and safe on the roads!

In today’s data-driven world, automotive telematics has revolutionized fleet management. As telematics companies compete to provide the most comprehensive data insights, Enigmatos takes a unique approach. We go beyond data to deliver reliable information that empowers fleet managers with valuable insights. At the core of our approach lies our robust data fidelity process, ensuring accuracy, completeness, and consistency.

The Distinction: Data vs. Information

Data itself is abundant in the telematics world, with providers boasting expansive datasets. However, the real value lies in transforming this raw data into meaningful information. While others may inundate with data, Enigmatos strives to extract insights that truly matter to fleet managers. Our emphasis is not solely on the quantity of data collected but on the quality of information delivered.

Data Fidelity: The Key to Quality

At Enigmatos, we take meticulous steps to ensure the fidelity of the data we gather. Every data point undergoes rigorous analysis, verification, and cleansing through our cyber-powered algorithms. This process guarantees the accuracy, completeness, and consistency of the data generated. We take pride in the reliability of our data and the trust it instills among our customers.

Translating Data into Valuable Information

Our unique data mining approach enables us to unlock the full potential of the collected data. Utilizing cutting-edge analytics and machine learning algorithms, we extract actionable insights that effectively address fleet management challenges. We delve deeper into the data, identifying patterns, trends, and correlations to provide decision-makers with the information necessary for optimizing fleet operations..

The Enigmatos Example:

Our Fleet Insights Report offers comprehensive and highly informative insights tailored to individual vehicles within the fleet, enabling fleet managers to make data-driven decisions like never before. What sets our report apart is its unique ability to provide accurate and relevant information by comparing specific vehicles to the entire fleet. We go beyond generic fleet-level analysis to deliver insights that truly matter for each vehicle’s performance, efficiency, and maintenance. With our Fleet Insights Report, fleet managers gain the power to optimize operations on a vehicle-by-vehicle basis, unlocking untapped potential and driving success.