A series of controlled cybersecurity tests in Norway, dubbed the "Lion Cage" experiment, has raised alarms about the security of public transportation infrastructure. The tests, conducted on November 7, 2025, revealed that electric buses manufactured by the Chinese company Yutong contain systems that could potentially be disabled remotely. These buses are in service across Europe and Australia, turning a localized finding into a global concern. The experiment, led by Oslo's transit operator Ruter, confirmed that the cloud-connected buses are vulnerable to external intervention. The discovery has prompted transportation authorities in Denmark, Australia, and other nations to launch immediate reviews of their transit fleet security, underscoring the critical intersection of supply chain security and national critical infrastructure.
The threat does not stem from a traditional malware attack but from a design feature that could be abused. The Yutong electric buses are equipped with cloud connectivity, presumably for diagnostics, maintenance, and fleet management. The Norwegian experiment, conducted in a signal-blocking underground facility, demonstrated that this connectivity creates a potential vector for remote interference.
The core issue is the ability for an external party—in this case, theorized to be the manufacturer—to send commands to the vehicle over a mobile network that could affect its operation, including potentially disabling it. While the Australian distributor claims updates are performed locally, the existence of a remote access capability presents a significant risk, especially for critical infrastructure like public transit.
This scenario highlights several key risks:
Specific technical details are sparse, but the attack vector involves the vehicle's Telematics Control Unit (TCU) and its connection to a cloud platform via a cellular modem. The likely MITRE ATT&CK for ICS techniques involved in such a scenario would be:
T0886 - Remote Services: Leveraging legitimate remote access capabilities built into the vehicle's systems.T0814 - Denial of Service: Sending a command to the vehicle's control systems (e.g., the Engine Control Unit or equivalent in an EV) to shut it down.T0885 - Wireless Communication: Using the built-in cellular connection to communicate with the vehicle.T0816 - Device Restart/Shutdown: The ultimate impact is the remote shutdown of the vehicle, causing a denial of service.The potential impact is significant, affecting public safety, economic activity, and national security.
Transit authorities in Australia, where over 1,500 Yutong vehicles operate, and across Europe are now forced to re-evaluate their procurement and security policies for connected vehicles.
| Type | Value | Description |
|---|---|---|
network_traffic_pattern |
Connections to manufacturer IPs from vehicle TCUs |
Monitor for any commands sent from the manufacturer's cloud platform that are not part of scheduled maintenance. |
log_source |
Vehicle Telematics Logs |
Analyze telematics data for remote shutdown or configuration change commands. |
api_endpoint |
Remote update/control API endpoints |
Scrutinize and restrict access to any APIs that allow for remote operational control of the vehicles. |
D3-NTA: Network Traffic Analysis. Look for anomalies in communication patterns or commands originating from unexpected sources.D3-FA: File Analysis.D3-ITF: Inbound Traffic Filtering.Log all commands sent to vehicles for auditing and forensic analysis.
Use firewalls to filter and restrict commands that can be sent to vehicles remotely.
Ensure only authorized and vetted software/firmware can run on the vehicle's control units.
Enforce strict authentication and authorization for any remote access to vehicle systems.
Transit authorities must deploy network filtering solutions, such as vehicular firewalls or secure gateways, to strictly control the commands Yutong buses can receive. The filtering policy should be 'default-deny,' blocking all inbound remote commands by default. Explicit 'allow' rules should only be created for a minimal set of necessary and authenticated functions, such as benign diagnostic queries. Critically, any commands capable of affecting vehicle operation (e.g., shutdown, braking) must be blocked unless they originate from a physically authenticated, local source. This creates a hardware and network-enforced barrier against remote malicious control, directly mitigating the primary risk of remote fleet immobilization identified in the 'Lion Cage' experiment.
Before deploying any over-the-air (OTA) firmware or software updates from Yutong, transit operators must perform dynamic analysis in a secure, isolated sandbox environment. This involves loading the update onto a test vehicle or emulator that is disconnected from the main fleet and observing its behavior. Security teams should monitor for any undocumented features, new remote access capabilities, or network 'callbacks' to unexpected servers. This 'trust but verify' approach prevents the manufacturer from surreptitiously introducing new backdoors or control mechanisms via software updates. It moves the operator from a position of blind trust to one of informed risk management, ensuring that only vetted and understood code is deployed to critical public infrastructure.
Implement continuous network traffic analysis for all communications between the Yutong bus fleet and their corresponding cloud management platforms. By baselining normal traffic patterns (e.g., frequency and size of diagnostic uploads), security teams can create high-fidelity alerts for anomalies. Specifically, monitor for the presence of command-and-control-like traffic, such as low-and-slow 'heartbeat' signals or encrypted commands originating from unusual IP ranges (e.g., outside of known Yutong or operator-controlled networks). Correlating network data with vehicle telemetry can help distinguish legitimate remote sessions from unauthorized access attempts, providing an essential layer of detection for potential misuse of the built-in remote capabilities.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats