Formula 1 might be the most famous racing competition in the world. However, behind the scenes, the sport is based almost entirely on math and science. And, no, this does not diminish the sport’s “cool factor”; it makes Formula 1 racing one of the most innovative industries in the world – and how cool is that? But, with this comes numerous concerns to the cybersecurity world.
The science and math of racing
Every move in an F1 race is calculated. And every millisecond is vital to the overall outcome – in Formula 1 racing, performance is everything. And to outperform competitors, innovation is a necessity; materials, aerodynamic design, and even the driver’s clothing are a few of the areas in which there are constant improvements. Even during the race, engineers are looking for ways to improve the car’s performance.
How do they do it? Data.
Each vehicle in an F1 race is equipped with around 150-300 sensors for data collection purposes. In a single Grand Prix weekend, each car produces roughly 300MB of data. The data is analyzed in real-time to ensure that the car performs at its optimum performance level. The data transmitted by the sensors to the engineering team can show things invisible to the human eye that might impact performance. As such, real-time decisions are made to improve a car’s performance, and the team’s overall outcome of the race. But the data collection is not limited to just the race itself. 5-10TB of data is produced each week at the factory. Most of it is being analyzed and used for innovation purposes. With an F1 racing team generating so much data – and such data being one of its greatest assets – a team is a valuable target for various cyberattacks.
Primarily, there is the threat of espionage in the form of data theft. F1 racing is known to be a highly competitive sport, and not always in a good way. The sport is often the subject of team rivalry, internally and externally. It is the latter that can be a significant threat when it comes to data security and espionage. With such a vast amount of data collected for innovation and performance improvement purposes, a rival team might seek to steal such data or intellectual property for its own performance improvements, as was the supposed intention behind the 2007 Spygate controversy.
In other cases, an adversary might seek to disrupt the team, whether that be disruption to production, to data analysis, or even the car itself. Attacks such as DDoS and ransomware can halt productivity at the factory by rendering systems and their data temporarily inaccessible. This is especially harmful when it comes to real-time data analysis since every second counts. In 2014, a trojan virus impacted the Marussia F1 team, resulting in a loss of an entire day’s worth of testing; a substantial amount of data that was not gathered and analyzed. In a more chilling scenario, a hacker could alter the data used to re-engineer vehicles in order to harm the car’s performance.
Data is a prime target
When it comes to financially motivated cybercriminals, data is a prime target. Stolen data can be sold on the dark web for profit – and data and intellectual property belonging to an F1 team increase the monetary reward by a significant amount, making the team an appealing target. Simple business information such as personal records and financial statements belonging to an F1 team can be enough for a bad actor to reap significant monetary benefits. Furthermore, the large budget of F1 teams makes them an attractive target for a ransomware attack. And the critical role that data plays in F1 racing increases the chances that the victim team will pay the ransom.
It is not simply the substantial amount of data that a team generates that puts it at risk. The Formula One World Championship requires the teams to relocate almost weekly to participate in the events held in more than 20 countries. Such global movement greatly expands the attack surface as data is transmitted internationally. Moreover, countries impose different cybersecurity regulations. The threat actors vary from country-to-country, which play a significant role in determining the threat landscape. With less stringent regulations in certain countries and regions, it is easier for an attacker to target an F1 team, while different threat actors pose different levels of risk based on their capabilities. The security department of the F1 team has a big task at hand to ensure the maintenance of the team’s security levels at any and all locations.
Big name, big target
The names in F1 racing are known worldwide, whether that be the drivers themselves or the teams and constructors. An attack on any F1 team would generate significant attention. Such recognition can be a motivating factor for some bad actors. In some instances, the attacker wants glory and fame for themselves; in others, the perpetrator might seek attention for a more specific reason. A successful cyberattack can highlight the security flaws of the victim team, harming its reputation.
Earlier this year, the Williams F1 team abandoned the launch of its new FW43B F1 car following a hack on the augmented reality app that would reveal the vehicle. Since many teams’ constructors also produce commercial vehicles, an attack can harm sales. Alternatively, a malicious actor might want to bring attention to a specific cause or movement, particularly one against an F1 team. For example, an environmentalist might target an F1 team to raise awareness of the environmental impacts of racing. In other instances, attacking an F1 team can simply be a strategic move by a hacktivist to bring attention to a completely unrelated issue. Whatever the reason, an attacker can be sure that targeting an F1 team will generate press coverage and public discourse.
Attackers are more frequently turning to hardware tools to conduct their malicious activity. These Rogue Devices are extremely threatening due to their covert nature. Network Implants sit on the Physical Layer, which is not covered by any existing security software solutions. This allows the device to go undetected. Spoofed Peripherals, on the other hand, impersonate legitimate HIDs and are therefore not detected as malicious. Depending on the device’s capabilities, an attacker can conduct a range of attacks. This includes data theft, network packet sniffing, MiTM, and more.
Formula 1 teams are an attractive target for a hardware-based attacker due to the vast amount of data that each team generates, as well as its global network. Furthermore, the use of data to improve performance means that many departments within the team need to communicate with one another and, hence, have access to the data. This expands the attack surface as there are more entry points for the attacker. Device visibility is imperative for an F1 team to reduce the chances of a successful hardware attack.
Ultimately, when it comes to Formula 1 racing, it is not just the cars racing against each other; the teams are in a race with attackers to ensure they protect their data and cars before a malicious actor can get their hands on them. But, unlike F1, the race does not end at the checkered flag.
Formula 1 security
Sepio Systems Hardware Access Control HAC-1, provides 100% hardware device visibility.
HAC-1 enables Hardware Access Control by setting rules based on the devices characteristics.
Formula 1 security is crucial.
HAC-1 instantly detects any devices which breach the set rules and automatically block them to prevent malicious attacks.
The idea is to Verify and then Trust that those assets are what they say they are.
Sepio Systems HAC-1 brings the ultimate solution to zero trust adoption by providing 100% hardware device visibility for Formula 1 security.
With greater visibility, the zero-trust architecture can grant access decisions with complete information.
Thus, enhancing the enterprise’s protection within, and outside of, its traditional perimeters.
The Hardware Access Control capabilities of HAC-1, block Rogue Devices as soon as they are detected
Formula 1 security
HAC-1 stop an attack at the first instance, not even allowing such devices to make network access requests.
HAC-1 is here to protect Government Agencies and the nation’s critical infrastructure
Embracing Zero Trust Hardware Access to strengthen Formula 1 security is key.