Researchers from the University of Texas at San Antonio have disclosed a novel attack method named VoltSchemer that targets the Combined Charging System (CCS), a prevalent fast-charging standard for electric vehicles (EVs). The attack exploits vulnerabilities in the Power Line Communication (PLC) protocol used between the EV and the charging station. By placing a small, low-cost device near the charging cable, an attacker can wirelessly intercept and inject malicious signals. The researchers demonstrated the ability to remotely stop charging sessions, command the charger to overcharge a vehicle's battery, and create fluctuating power demands. This research highlights a significant emerging threat to critical infrastructure, with potential impacts ranging from individual vehicle damage to localized power grid instability.
This is currently a proof-of-concept (PoC) attack demonstrated by academic researchers in a controlled environment. There is no evidence of in-the-wild exploitation. The researchers have responsibly disclosed their findings to the CharIN standards body and major charger manufacturers to allow for mitigation before the attack can be weaponized.
The potential impact of VoltSchemer is multi-layered:
D3-PCA: Protocol Content Analysis (though not in the provided list, it's a relevant concept) to validate that the communication conforms to the expected standard and is not malicious.Implement cryptographic authentication and encryption within the charging communication protocol (ISO 15118) to prevent signal injection and MitM attacks.
The vehicle's Battery Management System (BMS) should validate all commands from the charger and reject any that fall outside of safe operating parameters.
While difficult for this specific attack, the principle of filtering and validating communications to ensure they are from trusted sources applies.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats