Security Experts:

Connect with us

Hi, what are you looking for?


IoT Security

Remote ‘Brokenwire’ Hack Prevents Charging of Electric Vehicles

Researchers from the University of Oxford in the UK and Switzerland’s Armasuisse federal agency have identified a new attack method that can be used to remotely interrupt the charging of electric vehicles.

Researchers from the University of Oxford in the UK and Switzerland’s Armasuisse federal agency have identified a new attack method that can be used to remotely interrupt the charging of electric vehicles.

The attack method, named Brokenwire, involves wirelessly sending malicious signals to the targeted vehicle in order to cause electromagnetic interference and disrupt the charging session.

Brokenwire attack targets electric vehicle chargingThe attack targets the Combined Charging System — a widely used DC rapid charging technology — and it interrupts the communication between the charger and the vehicle.

The researchers pointed out that the Brokenwire attack only works against DC rapid chargers. Home charging stations, which typically use AC charging, are not impacted as they use different communication standards.

During their experiments, the researchers managed to reproduce the method against seven types of vehicles and 18 chargers, at distances of up to 47 m (150 feet) using a software-defined radio, a 1 W RF amplifier, and a dipole antenna. They demonstrated that the attack works between different floors of a building and through perimeter fences, and drive-by attacks are possible as well.

Brokenwire, which they described as a stealthy and scalable attack, affects not only electric cars, but also electric ships, airplanes and heavy duty vehicles.

“Brokenwire has immediate implications for many of the around 12 million battery EVs on the roads worldwide — and profound effects on the new wave of electrification for vehicle fleets, both for private enterprise and crucial public services,” the researchers said.

“While it may only be an inconvenience for individuals, interrupting the charging process of critical vehicles, such as electric ambulances, can have life-threatening consequences,” they warned.

Once an attack has been launched, the targeted vehicle will not charge until the attack stops and the vehicle is manually reconnected to the charging station. The experts noted that while the attack can be used to interrupt charging sessions, it does not appear to cause any permanent damage to the targeted systems.

The researchers have reported their findings to affected manufacturers and some technical details about the attack have not been publicly disclosed to prevent abuse. They noted that an attack can be conducted using off-the-shelf radio equipment, with minimal technical knowledge.

Related: Researchers Hack Remote Keyless System of Honda Vehicles

Related: New Flaws Expose EVlink Electric Vehicle Charging Stations to Remote Hacking

Related: Schneider Electric Vehicle Charging Stations Exposed to Hacker Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.


Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.