Chinese-Made Electric Buses in Europe & Australia Pose Remote Shutdown Risk

Cybersecurity Tests in Norway Reveal Chinese-Made Yutong Electric Buses Can Be Remotely Disabled

HIGH
November 9, 2025
5m read
Industrial Control SystemsCyberattackSupply Chain Attack

Related Entities

Organizations

Yutong

Other

RuterTelenor GroupUniversity of South-Eastern Norway

Full Report

Executive Summary

A series of controlled cybersecurity tests in Norway, dubbed the "Lion Cage" experiment, has raised alarms about the security of public transportation infrastructure. The tests, conducted on November 7, 2025, revealed that electric buses manufactured by the Chinese company Yutong contain systems that could potentially be disabled remotely. These buses are in service across Europe and Australia, turning a localized finding into a global concern. The experiment, led by Oslo's transit operator Ruter, confirmed that the cloud-connected buses are vulnerable to external intervention. The discovery has prompted transportation authorities in Denmark, Australia, and other nations to launch immediate reviews of their transit fleet security, underscoring the critical intersection of supply chain security and national critical infrastructure.


Threat Overview

The threat does not stem from a traditional malware attack but from a design feature that could be abused. The Yutong electric buses are equipped with cloud connectivity, presumably for diagnostics, maintenance, and fleet management. The Norwegian experiment, conducted in a signal-blocking underground facility, demonstrated that this connectivity creates a potential vector for remote interference.

The core issue is the ability for an external party—in this case, theorized to be the manufacturer—to send commands to the vehicle over a mobile network that could affect its operation, including potentially disabling it. While the Australian distributor claims updates are performed locally, the existence of a remote access capability presents a significant risk, especially for critical infrastructure like public transit.

This scenario highlights several key risks:

  • Remote Shutdown: The ability to immobilize a single bus or an entire fleet could cause widespread disruption in a major city.
  • Data Exfiltration: Connected vehicles collect vast amounts of data, including location (GPS), operational status, and potentially video from onboard cameras. Unauthorized access could lead to a massive privacy breach.
  • National Security: A foreign entity's ability to control a nation's public transportation fleet represents a clear national security threat, which could be leveraged during geopolitical tensions.

Technical Analysis

Specific technical details are sparse, but the attack vector involves the vehicle's Telematics Control Unit (TCU) and its connection to a cloud platform via a cellular modem. The likely MITRE ATT&CK for ICS techniques involved in such a scenario would be:

Impact Assessment

The potential impact is significant, affecting public safety, economic activity, and national security.

  • Public Safety: A sudden shutdown of buses could strand thousands of passengers and disrupt emergency services.
  • Economic Disruption: Paralyzing a city's transit system would have immediate economic consequences, preventing people from getting to work and causing traffic chaos.
  • Geopolitical Leverage: The capability could be used as a coercive tool in international disputes. The concentration of these vehicles from a single foreign manufacturer creates a systemic risk.
  • Loss of Trust: Public confidence in the safety and reliability of public transport could be severely eroded.

Transit authorities in Australia, where over 1,500 Yutong vehicles operate, and across Europe are now forced to re-evaluate their procurement and security policies for connected vehicles.

Cyber Observables for Detection

  • Network Traffic: Monitor for unauthorized or unexpected communication to or from the vehicle's TCU.
  • Vehicle CAN Bus Data: Analyze Controller Area Network (CAN) bus messages for commands that are not initiated by the driver or legitimate onboard systems.
  • Cloud Platform Logs: Audit logs from the fleet management platform for any unauthorized remote commands or access.
Type Value Description
network_traffic_pattern Connections to manufacturer IPs from vehicle TCUs Monitor for any commands sent from the manufacturer's cloud platform that are not part of scheduled maintenance.
log_source Vehicle Telematics Logs Analyze telematics data for remote shutdown or configuration change commands.
api_endpoint Remote update/control API endpoints Scrutinize and restrict access to any APIs that allow for remote operational control of the vehicles.

Detection & Response

  • Network Monitoring: Transit operators should deploy network monitoring tools capable of inspecting traffic between the vehicle fleet and the cloud backend. This aligns with D3FEND's D3-NTA: Network Traffic Analysis. Look for anomalies in communication patterns or commands originating from unexpected sources.
  • Firmware Analysis: Conduct security audits of the vehicle's firmware to identify and understand the full scope of its remote capabilities. This corresponds to D3FEND's D3-FA: File Analysis.
  • Incident Response Plan: Develop a specific IR plan for a fleet-wide denial-of-service event, including procedures for manually restoring vehicle operation if possible.

Mitigation

  • Network Isolation/Firewalling: Implement firewalls at the vehicle or network level to strictly control what commands the TCU can receive and execute. Block all remote commands except those explicitly authorized and authenticated. This is a form of D3FEND's D3-ITF: Inbound Traffic Filtering.
  • Delayed Updates: As suggested in the report, implement a policy to delay and vet all over-the-air (OTA) updates. Updates should be tested in a sandbox environment before being deployed to the fleet.
  • Procurement Security: Update procurement policies to require transparency from manufacturers about all remote access capabilities. Demand the ability to disable or control these features as a condition of purchase. This is a procedural mitigation falling under D3FEND's Harden category.
  • Authentication and Authorization: Ensure any remote access requires strong, multi-factor authentication and is logged and audited. Access should be restricted to authorized personnel within the transit authority.

Timeline of Events

1
November 7, 2025
Controlled cybersecurity tests ('Lion Cage' experiment) are conducted in Norway on Yutong buses.
2
November 9, 2025
This article was published

MITRE ATT&CK Mitigations

Log all commands sent to vehicles for auditing and forensic analysis.

Use firewalls to filter and restrict commands that can be sent to vehicles remotely.

Ensure only authorized and vetted software/firmware can run on the vehicle's control units.

Enforce strict authentication and authorization for any remote access to vehicle systems.

D3FEND Defensive Countermeasures

Transit authorities must deploy network filtering solutions, such as vehicular firewalls or secure gateways, to strictly control the commands Yutong buses can receive. The filtering policy should be 'default-deny,' blocking all inbound remote commands by default. Explicit 'allow' rules should only be created for a minimal set of necessary and authenticated functions, such as benign diagnostic queries. Critically, any commands capable of affecting vehicle operation (e.g., shutdown, braking) must be blocked unless they originate from a physically authenticated, local source. This creates a hardware and network-enforced barrier against remote malicious control, directly mitigating the primary risk of remote fleet immobilization identified in the 'Lion Cage' experiment.

Before deploying any over-the-air (OTA) firmware or software updates from Yutong, transit operators must perform dynamic analysis in a secure, isolated sandbox environment. This involves loading the update onto a test vehicle or emulator that is disconnected from the main fleet and observing its behavior. Security teams should monitor for any undocumented features, new remote access capabilities, or network 'callbacks' to unexpected servers. This 'trust but verify' approach prevents the manufacturer from surreptitiously introducing new backdoors or control mechanisms via software updates. It moves the operator from a position of blind trust to one of informed risk management, ensuring that only vetted and understood code is deployed to critical public infrastructure.

Implement continuous network traffic analysis for all communications between the Yutong bus fleet and their corresponding cloud management platforms. By baselining normal traffic patterns (e.g., frequency and size of diagnostic uploads), security teams can create high-fidelity alerts for anomalies. Specifically, monitor for the presence of command-and-control-like traffic, such as low-and-slow 'heartbeat' signals or encrypted commands originating from unusual IP ranges (e.g., outside of known Yutong or operator-controlled networks). Correlating network data with vehicle telemetry can help distinguish legitimate remote sessions from unauthorized access attempts, providing an essential layer of detection for potential misuse of the built-in remote capabilities.

Sources & References

Concerns About Cybersecurity Increase Globally with Yutong Electric Buses
RS Web Solutions (rswebsols.com) November 9, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ICSCritical InfrastructureTransportationYutongSupply Chain SecurityNational Security

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading