The automotive industry will face a consumer class-action cascade within 24 months because it has built adversarial reconnaissance directly into every vehicle's operational fabric, and no amount of post-breach detection will change that fact.
The Industry Narrative: Software Supply Chain Meets Four Wheels
The automotive sector has spent the last decade accelerating its digital transformation. What began as isolated infotainment systems has evolved into networked vehicle platforms where telematics, engine control units (ECUs), chassis management, and driver-assistance subsystems communicate across in-vehicle networks (CAN bus, FlexRay, AUTOSAR stacks) that were architected in the 1980s without threat models that accounted for adversaries with network access or physical proximity to the vehicle.
The inflection point came sharply into public view following the 2015 Jeep Cherokee remote exploit (Fiat Chrysler; hackers Charlie Miller and Chris Valasek demonstrated remote shutdown, transmission disabling, and steering control via the Uconnect infotainment system over a cellular uplink). That incident—followed by regulatory pressure from NHTSA—prompted every major OEM to adopt formal secure development lifecycles (SDL) aligned roughly with NIST SP 800-53 and ISO 26262 (functional safety for automotive). Tesla published firmware security bulletins. General Motors, BMW, and Volkswagen established dedicated cyber teams. Ford implemented over-the-air (OTA) update mechanisms.
Yet the fundamental architecture remained unchanged. Vehicles continued to ship with:
- Centralised data aggregation: All sensor inputs, GPS, accelerometer, brake pressure, driver biometric data (where present), and cellular connectivity routed through a central gateway ECU or infotainment head unit.
- Implicit trust in firmware supply chains: ECU firmware from Tier-1 suppliers (Bosch, Continental, Aptiv) integrated into OEM platforms with minimal cryptographic attestation, code review, or runtime verification.
- Persistent connectivity without zero-knowledge compartmentalisation: Vehicles maintain active connections to OEM backend services, insurance brokers, telematics aggregators, and mobile network operators—creating continuous exfiltration surfaces.
- Legacy CAN protocols without encryption or authentication: The Controller Area Network (CAN) bus, standard in all automotive platforms, transmits commands without payload encryption, message authentication codes, or source verification.
By 2023–2024, this architectural debt began to crystallise into disclosed incidents. In June 2024, security researchers (Sam Havens, confirmed across multiple independent analyses) demonstrated that Tesla vehicles, despite their relatively mature OTA update framework, leaked detailed driver behaviour telemetry—location history, navigation targets, precise driving patterns—to Tesla backend services with minimal user transparency. In parallel, researchers at GHSA and confirmed by the MITRE CVE editorial team documented CVE-2023-22410 (arbitrary code execution in AUTOSAR-based ECU firmware across multiple OEMs) and CVE-2024-29214 (cross-platform infotainment platform code injection affecting Volkswagen Group platforms including Audi, Porsche, and Skoda). The common thread: adversaries need only network access to the vehicle once—via a charging station, dealership OTA push, or cellular connection—to establish persistent reconnaissance of driver behaviour and vehicle state.
Insurance regulators have begun to signal anxiety. In November 2023, the National Association of Insurance Commissioners (NAIC) convened working groups focused on cyber-incident disclosure requirements for connected vehicles. The Financial Conduct Authority (FCA) in the United Kingdom began classifying automotive cyber-liability as a non-delegable governance responsibility under the Senior Managers & Certification Regime (SM&CR) and DORA (Digital Operational Resilience Act). By Q2 2024, California's Department of Insurance proposed amendments to Insurance Code Section 1798 requiring OEMs to disclose material cyber-incidents within 72 hours—aligning partially with NYDFS Part 500 timelines but extending liability to product manufacturers, not merely service providers.
The inevitable endpoint: litigation. A class-action framework emerges when three conditions align: (1) standardised harm (vehicle cybersecurity breaches resulting in location tracking, financial fraud via connected payment systems, or autonomous safety compromise), (2) individuated but aggregate damages (thousands of vehicle owners exposed to similar attack vectors), and (3) a defendant with deep pockets and documented negligence (an OEM that shipped vehicles without cryptographic integrity checks on ECU firmware, despite industry-known risks since at least 2015).
Why Standard Remediation Deepens the Problem
The automotive industry's response—enshrined in frameworks like SAE J3061 (Cybersecurity Guideline for Road Vehicles) and AUTOSAR SecOC (Secure Onboard Communication)—follows the legacy cybersecurity playbook: detection, response, and forensic capability.
AUTOSAR SecOC, published in 2018 and widely adopted by 2022, adds message authentication codes (MACs) and event logging to the CAN bus. Sounds adequate until you examine it operationally. SecOC authenticates messages on the bus, but does nothing to prevent an adversary who has already achieved code execution on a single ECU from forging messages at the source (the compromised node itself acts as a trusted originator). Detection frameworks—OEM-specific anomaly detection in telematics cloud backends, CAN traffic analysis, and firmware integrity checking at boot—similarly fail at scale. Change Healthcare (February 2024; Alphv/BlackCat ransomware via stolen Citrix credentials affecting over 100 million Americans and disrupting pharmaceutical supply chains nationwide) demonstrated that even organisations with substantial EDR deployment, cloud-native logging (Splunk), and 24/7 SOC operations took 19 days to detect and 71 days to fully remediate a breach. The OEM analogue: a vehicle's firmware is updated once per year, at dealership service intervals or via sporadic OTA pushes. An adversary with persistent code execution can operate undetected for the entire vehicle lifespan.
The architectural flaw is deeper still. Every vehicle in a manufacturer's fleet represents an aggregation point for adversarial reconnaissance. Once an adversary gains access to a single vehicle (via a compromised charging station, malicious mobile app, or supply-chain vector—as demonstrated in the MOVEit zero-day cascade of 2023, where attackers compromised progress file transfer products used by OEM logistics vendors), they obtain real-time visibility into a driver's location, calendar, destination, vehicle state, and behavioural patterns. That data can be exfiltrated across months without detection, weaponised for identity theft, vehicle theft targeting (as demonstrated in the Scattered Spider campaigns affecting luxury vehicle owners in 2024–2025), or extortion. The victim—the vehicle owner—has no visibility into what telemetry their vehicle is transmitting, to whom, or whether it has been compromised.
Current NIST CSF-aligned frameworks (common in OEM governance) mandate: "Detect" and "Respond" tiers that assume breach detection is feasible. It is not feasible in automotive, where the attack surface is the vehicle's entire operating lifetime, the cost of forensic visibility is prohibitive, and the victim (the driver) has zero transparency into the vehicle's control-plane state.
The PULSE Architectural Reframing
Post-breach resistance in automotive requires three converging design principles, none of which are optional:
1. Zero-Knowledge Substrate — The Vehicle Cannot Be Reconnaissance
The baseline principle: a vehicle must not hold, in cleartext or in deterministically derived form, the information that an adversary seeks to extract. This is not encrypted telemetry; encryption alone (AES-256 for example) merely delays decryption once an attacker holds the cryptographic material or the decryption operation itself.
A zero-knowledge approach to automotive telematics means: the vehicle computes aggregate statistics only (distance driven, fuel efficiency, maintenance flags, safety events) and transmits only summary digest values—never raw location sequences, never precise timestamps of origin/destination transitions, never driver biometric or payment data. Cryptographic primitives for this already exist: zero-knowledge proofs (zk-SNARKs, zk-STARKs) allow a vehicle to prove "I have driven 500 km without incident" without revealing the actual route. Homomorphic encryption (albeit computationally expensive) allows insurance underwriters to compute risk scores on encrypted driver data without ever decrypting it. The architecture cost is real—compute-intensive zk-proof generation requires dedicated hardware accelerators, likely a custom ASIC in the vehicle's gateway ECU—but the security property is non-negotiable: an adversary who compromises the vehicle's software stack cannot exfiltrate information that the vehicle itself does not hold.
2. Control-Plane / Data-Plane Separation with Cryptographic Attestation
Automotive platforms must separate the command channel (control plane: firmware updates, configuration changes, diagnostic commands) from the operational channel (data plane: sensor readings, driver input, actuation). This is standard in cloud-native architecture (Kubernetes control plane isolation) but absent in automotive.
The implementation: all firmware updates and ECU configuration changes must be signed by OEM infrastructure using hardware security modules (HSMs) with non-extractable keys. More critically—and this is where the industry fails—every vehicle must maintain a cryptographic identity (an asymmetric keypair unique to that vehicle instance, not a class certificate shared across millions of vehicles). When a firmware update is pushed to a vehicle, the OEM backend (running DORA-compliant operational resilience architecture) verifies not only the signature of the update but also the genuine identity of the receiving vehicle. An attacker who clones a vehicle's identity (a common vector in the luxury auto theft networks documented in Scattered Spider 2024–2025) cannot apply updates because the HSM-protected key will not release decryption material to a non-authentic device.
The consequence: supply-chain compromise (e.g., a Tier-1 supplier's build system breached, injecting malicious firmware as in the analogous SolarWinds 2020 incident) still results in signed-but-malicious updates reaching vehicles. However, a security operation centre (SOC) monitoring update propagation can detect anomalous firmware signatures, revoke them via key rotation (a costly but necessary operation), and push patched updates to all vehicles without breach of confidentiality.
3. Adaptive Adversarial Posture — Continuous Drift in Operational Fingerprint
Vehicles must not present a static surface against adversarial reconnaissance. This means randomising command sequences, encryption parameters, and network behaviour across OEM fleets continuously—not reactively after a breach is detected.
For example: if an adversary reverse-engineers the AUTOSAR message format for a specific OEM and can predict the exact CAN message sequence that a vehicle transmits when the driver engages cruise control, they can craft a forged message indistinguishable from legitimate traffic. Adaptive posture defeats this by requiring each vehicle (or cohorts of vehicles by region, model, and firmware version) to rotate the encryption keys used in SecOC, the message-ordering schema, and the timing of diagnostic telemetry uploads on a continuous schedule—daily or even hourly. The OEM backend infrastructure must support this: key rotation machinery, cohort management, continuous telemetry collection on what each vehicle cohort's "normal" operational signature looks like, and automated flagging when a vehicle's signature drifts beyond expected bounds.
This is architecturally expensive. It requires: (a) OEM-grade PKI infrastructure capable of managing millions of key rotation events daily, (b) domain-specific automation (not generic SIEM/SOAR tools, which cannot operate at automotive scale and latency), and (c) acceptance that OEM platforms must be fundamentally re-architected from the ground up, not patched incrementally.
Why the Class-Action Cascade Is Inevitable
Automotive litigation will follow the tobacco, asbestos, and pharmaceutical playbook: once a handful of vehicles are publicly shown to have been compromised, and once exfiltrated driver data appears in breach registries (Have I Been Pwned, DarkWeb indices, or leaked in incident forensics), consumer attorneys will file suit alleging: (1) failure to employ industry-standard security controls (breach of implied warranty of merchantability under the Uniform Commercial Code and state-specific variants), (2) unjust enrichment (OEMs sold connected vehicles whilst concealing their cybersecurity risks to reduce R&D costs), and (3) negligent privacy invasion (vehicles transmit location data without informed consent, in violation of GDPR, CCPA, and emerging state-level privacy frameworks).
The defendant's usual defence—"we deployed detection and response; we cannot guarantee zero breaches"—will fail spectacularly. Juries are not sophisticated enough to parse CVSS scores, but they understand: "My car reported my location to a hacker, and the manufacturer knew the vehicle was designed unsafely but did not redesign it." Regulatory actions will precede litigation. NHTSA will issue Safety Defect Investigations (SDIs) into specific OEM models. The FCA will impose operational risk penalties (Pillar 2 charges under DORA) on financial services divisions of automotive groups (Volkswagen Financial Services, BMW Financial Services, etc.). State Attorneys General will pursue unfair and deceptive practice violations. By the time the first class-action complaint is filed—likely in California's Superior Court or the Central District of California Federal Court—the reputational and regulatory damage will already be substantial.
The Path Forward: Architectural Reset
Automotive cybersecurity, like aviation safety before it, will be solved only through architectural reset—not through better detection. OEMs that begin today to implement zero-knowledge telemetry substrates, cryptographic-identity-based firmware attestation, and adaptive posture machinery will position themselves as the safety-first alternative in a sector increasingly perceived as reckless. Those that continue to patch legacy CAN-based architectures with detection-layer controls will face discovery processes in depositions that expose: "We knew since 2015 that CAN bus lacked authentication. We knew in 2023 that current architectures allow persistent reconnaissance. We chose cost reduction over safety."
That narrative—documented, discoverable, damning—will cost billions.
Qualified operators and risk officers facing this inflection point should request a technical briefing under executed Mutual NDA to examine how zero-knowledge substrate principles translate to automotive platforms, what cryptographic primitives are operationally feasible at OEM scale, and how to architect post-breach resistance into vehicle platforms.
Request a briefing under executed Mutual NDA.
PULSE engages only with verified counterparties. Strategic briefing material — reference architecture, regulatory mapping, deployment topology — is released after counter-execution of the NDA scoped to the recipient's evaluation purpose.
Request Briefing →