{"id":13542,"date":"2022-04-09T16:31:47","date_gmt":"2022-04-09T14:31:47","guid":{"rendered":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/?p=13542"},"modified":"2022-04-09T16:31:47","modified_gmt":"2022-04-09T14:31:47","slug":"are-cybercriminals-waiting-for-an-opportune-time-to-attack-u-s-trucks","status":"publish","type":"post","link":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/2022\/04\/09\/are-cybercriminals-waiting-for-an-opportune-time-to-attack-u-s-trucks\/","title":{"rendered":"Are cybercriminals waiting for an opportune time to attack U.S. trucks?"},"content":{"rendered":"<p style=\"text-align: justify;\">After the pandemic and other problems showed vulnerabilities, hackers sponsored by nefarious states could attempt to cause more supply chain problems, cybersecurity expert warns fleets.<\/p>\n<p style=\"text-align: justify;\">ORLANDO, Florida\u2014There\u2019s never been a known successful cyberattack on a U.S. commercial vehicle, but that doesn\u2019t mean they aren\u2019t vulnerable to cybercriminals. It\u2019s quite possible that some U.S. enemies already have plans to hack trucks and other vehicles but are just waiting for the right time, according to a cybersecurity expert who spoke this week to trucking industry stakeholders.<\/p>\n<p style=\"text-align: justify;\">A recent <a href=\"https:\/\/investor.expeditors.com\/press-releases\/2022\/02-21-2022-032617120\" target=\"_blank\" rel=\"noopener noreferrer\">cyberattack on Expeditors International<\/a> shut down the company&#8217;s computer systems and slowed its global operations days before Russia invaded Ukraine last month\u2014the type of logistics problem that enemy nation-states can cause, John Sheehy, SVP of research and strategy for <a href=\"https:\/\/ioactive.com\/\">IOActive<\/a>, said here during a cybersecurity session at <a href=\"https:\/\/www.trucking.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">American Trucking Associations\u2019<\/a> <a href=\"https:\/\/tmc.trucking.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Technology &amp; Maintenance Council<\/a> 2022 annual meeting.<\/p>\n<p style=\"text-align: justify;\">While it didn\u2019t affect vehicles,\u00a0 Sheehy\u00a0called the timing of the Expeditors ransomware attack interesting.<\/p>\n<p style=\"text-align: justify;\">\u201cSuspiciously, it was right in the timeframe when the war in Ukraine was heating up. And what you&#8217;ll see, unfortunately, is sometimes these types of attacks\u2014ransomware or distributed denial of service attacks\u2014are used as a distraction, while something more significant is occurring,\u201d he explained. \u201cSo, depending on who your clients or customers within your business are, you may be targeted because of the cargo you&#8217;re carrying.\u201d<\/p>\n<p style=\"text-align: justify;\"><b>See also:\u00a0<\/b><a href=\"https:\/\/www.fleetowner.com\/news\/article\/21234849\/ukraine-update-understanding-risks-to-us-trucking-transportation\" target=\"_blank\" rel=\"noopener noreferrer\"><i>Ukraine update: Understanding risks to U.S. trucking, transportation<\/i><\/a><\/p>\n<p style=\"text-align: justify;\">A cyberattack on a single truck could stop the freight on it and the driver hauling it, Sheehy said during an interview after the TMC session at the Orange County Convention Center.<\/p>\n<p style=\"text-align: justify;\">\u201cIf you have three trucks in your fleet, that might be a big impact for you and your operations,\u201d he said. \u201cIf you have 30,000, it\u2019s not going to have a very big impact\u2014other than pointing out that you\u2019ve got an issue to deal with. The great concern is when a large number are impacted.\u201d<\/p>\n<p style=\"text-align: justify;\">That theoretical mass attack could be levied against trucks from one OEM or commercial vehicles from a telematics provider or all the trucks in a single fleet, Sheehy said. And he gave examples.<\/p>\n<p style=\"text-align: justify;\">\u201cParticularly if they are delivering some type of critical goods that are high value, high risk,\u201d he explained. \u201cIf there&#8217;s something that people&#8217;s lives depend on and getting somewhere at a certain time\u2014those are things that have very significant consequences. Every modern military understands how critical logistics is to operations. It is something they will exploit when they feel it\u2019s appropriate to do so. Unfortunately, that capability does exist.\u201d<\/p>\n<h3 style=\"text-align: justify;\">Preparing for an attack<\/h3>\n<p style=\"text-align: justify;\">At the University of Detroit Mercy College of Engineering &amp; Science, faculty are working with the Michigan National Guard and U.S. Department of Defense to create joint cybersecurity workshops and online training courses on the subject.<\/p>\n<p style=\"text-align: justify;\">This training will replicate what engineers learned in the <a href=\"https:\/\/www.cybertruckchallenge.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberTruck Challenge<\/a>, said Mark Zachos, <a href=\"https:\/\/www.dgtech.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">DG Technologies<\/a> president, who led the TMC session on March 7. The CyberTruck Challenge was created five years ago to show college students the cyber issues that heavy-vehicle engineers might confront in a more connected, high-tech transportation world.<\/p>\n<p style=\"text-align: justify;\">\u201cYou all understand that terrible conflict in Ukraine,\u201d Zachos told the TMC audience. \u201cLogistically, some people are aware of this; they\u2019re having lots of problems. We need to make sure that our country is on the forefront of defense. And this is part of our defensive shield here. We\u2019re training from college students to the actual maintainers about cybersecurity.\u201d<\/p>\n<h3 style=\"text-align: justify;\">How cybercriminals could disrupt trucking<\/h3>\n<p style=\"text-align: justify;\">The food and essential-products shortages that many Americans faced at the start of the COVID-19 pandemic in 2020 was an example of how fragile the U.S. supply chain is and could be something a foreign actor could try to replicate using fleet cyberattacks, Sheehy told <i>FleetOwner<\/i>.<\/p>\n<p style=\"text-align: justify;\">\u201cThat&#8217;s a situation that if the right trucks were attacked, that [2020 problem] could repeat,\u201d he said. \u201cAnd it goes beyond just the trucks because it&#8217;s also the operational technology and the warehousing and distribution units\u2014your forklifts, your pickers, your other systems don\u2019t work. It could be as simple as the Wi-Fi in the warehouse\u2014then your operations have stopped. That\u2019s why we often talk about operational resilience.\u201d<\/p>\n<p style=\"text-align: justify;\"><b>See also:\u00a0<\/b><a href=\"https:\/\/www.fleetowner.com\/technology\/article\/21181848\/covid19-left-companies-that-didnt-upgrade-cybersecurity-more-vulnerable\" target=\"_blank\" rel=\"noopener noreferrer\"><i>COVID-19 left companies that didn\u2019t upgrade cybersecurity more vulnerable<\/i><\/a><\/p>\n<div class=\"img-align-center\" style=\"text-align: justify;\" data-v-520b16e0=\"\">\n<div class=\"ebm-content-teaser-image\" align=\"center\" data-v-05efa908=\"\" data-v-520b16e0=\"\">\n<div data-v-578179fc=\"\" data-v-05efa908=\"\">\n<figure class=\"ebm-image-wrapper\" data-v-578179fc=\"\">\n<div class=\"credit\" data-v-578179fc=\"\">\n<div class=\"credit-text-wrapper\" data-v-578179fc=\"\">\n<div class=\"credit-text\" data-v-578179fc=\"\">CyberTruck Challenge<\/div>\n<\/div>\n<div class=\"ebm-icon-wrapper\" data-v-578179fc=\"\">\n<div class=\"ebm-icon mdi:image-area ebm-icon\" data-v-4d7a0022=\"\" data-v-578179fc=\"\"><\/div>\n<\/div>\n<\/div>\n<\/figure>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"img-align-center\" style=\"text-align: justify;\" data-v-520b16e0=\"\">\n<div class=\"ebm-content-teaser-image\" align=\"center\" data-v-05efa908=\"\" data-v-520b16e0=\"\">\n<div data-v-578179fc=\"\" data-v-05efa908=\"\">\n<figure class=\"ebm-image-wrapper\" data-v-578179fc=\"\">\n<div class=\"ebm-image\" data-v-578179fc=\"\">\n<div class=\"ebm-image\" data-v-578179fc=\"\">\n<div title=\"The fourth CyberTruck Challenge was held in August 2021.\" data-v-578179fc=\"\"><img title=\"The fourth CyberTruck Challenge was held in August 2021.\" src=\"https:\/\/img.fleetmaintenance.com\/files\/base\/ebm\/fm\/image\/2022\/03\/16x9\/Cybertruck_Challenge_2021.62275f36ae2b4.622f33f8a31eb.png?auto=format,compress&amp;w=1300&amp;h=730&amp;fit=max\" alt=\"The fourth CyberTruck Challenge was held in August 2021.\" \/><\/div>\n<\/div>\n<\/div><figcaption class=\"ebm-image-caption\" data-v-578179fc=\"\">The fourth CyberTruck Challenge was held in August 2021.<\/figcaption><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<p style=\"text-align: justify;\">An operations director for a major carrier, who asked not to be identified, said fleets are one click away from an attack. And while an attack on one or many trucks still remains a potential threat, ransomware is hurting fleets and logistics companies such as Expeditors International.<\/p>\n<p style=\"text-align: justify;\">Sheehy\u2019s company, IOActive, recently ran a test for a major company to see how much it would cost to breach its cyber walls. Jaimie Riden, an IOActive security consultant, said the exercise showed the weaknesses within most companies&#8217; outward-facing technology services.<\/p>\n<p style=\"text-align: justify;\">In a blog post, <a href=\"https:\/\/labs.ioactive.com\/2022\/01\/how-we-hacked-your-billion-dollar.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cHow we hacked your billion-dollar company for 42 bucks,\u201d<\/a> he wrote the most significant expenditure was on coffee.<\/p>\n<p style=\"text-align: justify;\">\u201cA lot of traffic goes in and out of a normal company\u2019s internet perimeter: email comes in and goes out; web traffic from customers, or potential customers comes in, web traffic for internal users goes out; and lots of necessary services create traffic, such as remote desktop, web authentication (especially password resets), helpdesk services, file exchange, and more,\u201d he wrote in January. \u201cThe question is, can we make use of combinations of seemingly minor problems to access internal systems? The answer is mostly yes.\u201d<\/p>\n<h3 style=\"text-align: justify;\">\u2018Multiple nation-states capable of attacking trucks\u2019<\/h3>\n<p style=\"text-align: justify;\">If there are no real-world examples of successful cyberattacks on commercial vehicles, is all this talk just abstract?<\/p>\n<p style=\"text-align: justify;\">\u201cIt\u2019s a very real concern,\u201d Sheehy said. \u201cWe have seen threat-actors demonstrate an inherent interest in getting the information they need to attack these vehicles.\u201d<\/p>\n<p style=\"text-align: justify;\">Those actors could just be waiting for the right time. The last time Russia invaded Ukraine\u2014when it seized control of Crimea in 2014\u2014IOActive warned that U.S. satellite communication terminals (SatComs), those used by airplanes, ships, and military units, <a href=\"https:\/\/www.csmonitor.com\/World\/Passcode\/2014\/0425\/Can-military-s-satellite-links-be-hacked-Cyber-security-firm-cites-concerns\" target=\"_blank\" rel=\"noopener noreferrer\">were vulnerable to cyberattacks<\/a>. Sheehy said that Russia used that research to <a href=\"https:\/\/www.axios.com\/security-flaws-satcom-satellite-airplanes-wifi-hacking-aae9a6f5-1494-4934-9641-3d4607ae8a2d.html\" target=\"_blank\" rel=\"noopener noreferrer\">devise an operation<\/a> to attack the small aperture satellites.<\/p>\n<p style=\"text-align: justify;\">Shortly after Russia launched its latest war on Ukraine, the U.S. satellite communications firm Viasat Inc. said it suspected it was the victim of a cyberattack that <a href=\"https:\/\/www.reuters.com\/business\/aerospace-defense\/satellite-firm-viasat-probes-suspected-cyberattack-ukraine-elsewhere-2022-02-28\/\" target=\"_blank\" rel=\"noopener noreferrer\">knocked out residential broadband services<\/a> in Ukraine and other European countries.<\/p>\n<p style=\"text-align: justify;\">\u201cIt was something where someone on the offensive side of cybersecurity\u2014somebody who\u2019s going to go out to produce some type of effect for their sponsor\u2014said, \u2018OK, this is interesting. We can do this,\u2019\u201d Sheehy explained. \u201cThey went and developed the capability and put it on a shelf until they needed it. The time was right during the invasion of Ukraine. They deployed it because it had strategic value to them. So I would assess that there are multiple nation-states today with the capability on the shelf to attack vehicles.\u201d<\/p>\n<h3 style=\"text-align: justify;\">Increasing severity of cyberattacks<\/h3>\n<p style=\"text-align: justify;\">Recent incidents, such as the <a href=\"https:\/\/www.fleetowner.com\/technology\/article\/21163713\/colonial-pipeline-shutdown-shows-power-of-cybercrimes\" target=\"_blank\" rel=\"noopener noreferrer\">Colonial Pipeline attack<\/a> and the more recent\u00a0satellite\u00a0attack, show cyberattacks are getting more impactful.<\/p>\n<p style=\"text-align: justify;\">\u201cThat was a situation where we had invested the time and resources to bring attention to the issue, and some organizations responded, some organizations listened very carefully,\u201d Sheehy said. \u201cOther organizations did not make the right decisions at the top levels about investing resources in managing those risks. That\u2019s why the attack did happen.\u201d<\/p>\n<p style=\"text-align: justify;\">No matter the size of the fleet, knowing what assets might be attractive to cybercriminals is important, he added. \u201cThat is kind of the basics. From that, you look at what are the typical attack techniques. What do I have? What would a bad guy most likely go after? That\u2019s where you start to invest in protection.\u201d<\/p>\n<p style=\"text-align: justify;\">Could the trucking industry, responsible for most U.S. freight movement and the backbone of supply chains, be next?<\/p>\n<p style=\"text-align: justify;\">\u201cIt\u2019s difficult to say because these types of decision-makers will only do so when it\u2019s in their interest,\u201d Sheehy explained. \u201cIf you asked me a month ago, I would have said we\u2019re not going to see that satellite attack for a while. I also didn\u2019t expect the Russian invasion of Ukraine because that was not consistent with past behavior.&#8221;<\/p>\n<p style=\"text-align: justify;\"><b>See also:<\/b>\u00a0<i><a href=\"https:\/\/www.fleetowner.com\/technology\/article\/21163965\/the-next-pandemic-cybercrime\" target=\"_blank\" rel=\"noopener noreferrer\">Cybercrime is the next pandemic<\/a><\/i><\/p>\n<p style=\"text-align: justify;\">\u201cSo something did change in their decision calculus that produced the effect,\u201d Sheehy added. \u201cThat\u2019s why that weapon was used.\u201d<\/p>\n<p style=\"text-align: justify;\">After U.S. supply chain weaknesses were exposed this decade, Sheehy said cybercriminals sponsored by shady nation-states could have their eyes on specific organizations and businesses such as fleets. \u201cYou might be attacked because of who your client is\u2014or who their client is,\u201d he said.<\/p>\n<p style=\"text-align: justify;\">That\u2019s why sharing information with clients is important if your firm is attacked\u2014because a cyberattack on one company could be a route hackers access another, according to Sheehy. That\u2019s why sharing information about company security breaches can contribute to the common good.<\/p>\n<p style=\"text-align: justify;\">\u201cEmpowering them with the information they need to make decisions to protect themselves and their clients is very helpful,\u201d\u00a0Sheehy said.<\/p>\n<h3 style=\"text-align: justify;\">How do fleets prepare for cyberattacks?<\/h3>\n<p style=\"text-align: justify;\">Sheehy said transportation companies must understand what risks and threats their businesses face. \u201cIt\u2019s going to be different if you\u2019re a smaller fleet or owner-operator versus somebody who\u2019s 30-, 50-, 60,000 vehicles.\u201d<\/p>\n<p style=\"text-align: justify;\">No matter the size of the fleet, knowing what assets might be attractive to cybercriminals is important, he added. \u201cThat is kind of the basics. From that, you look at what are the typical attack techniques. What do I have? What would a bad guy most likely go after? That\u2019s where you start to invest in protection.\u201d<\/p>\n<hr \/>\n<p><i>This article originally appeared in <a href=\"https:\/\/www.fleetowner.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FleetOwner.com<\/a>.<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>By <span data-v-70405d35=\"\"><a href=\"https:\/\/www.fleetmaintenance.com\/21129678\" data-v-70405d35=\"\">Josh Fisher<\/a><\/span><\/p>\n<p><span class=\"posted-by\">Source: <a href=\"https:\/\/www.fleetmaintenance.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.fleetmaintenance.com\/<\/a><\/span><\/p>\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<h1 style=\"text-align: center;\"><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/who-we-are\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>KNOW WHO WE ARE<\/strong><\/a><\/h1>\n<p><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/who-we-are\/\"><img loading=\"lazy\" class=\"aligncenter wp-image-11695\" src=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-300x150.jpg\" sizes=\"(max-width: 430px) 100vw, 430px\" srcset=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-300x150.jpg 300w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-1024x512.jpg 1024w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-1536x768.jpg 1536w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-2048x1024.jpg 2048w\" alt=\"\" width=\"430\" height=\"215\" \/><\/a><\/p>\n<\/div>\n<div class=\"w-post-elm post_content\">\n<h1 style=\"text-align: center;\"><span style=\"color: #0000ff;\"><strong>KNOW THE FLEET MANAGEMENT YOUTUBE CHANNEL<\/strong><\/span><\/h1>\n<p>&nbsp;<\/p>\n<\/div>\n<p><a href=\"https:\/\/www.youtube.com\/channel\/UCOPw2rdwSEA0iIapSs0fHJw\"><img loading=\"lazy\" class=\"alignnone wp-image-13320 size-full aligncenter\" src=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-scaled.jpg\" sizes=\"(max-width: 2560px) 100vw, 2560px\" srcset=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-scaled.jpg 2560w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-300x150.jpg 300w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-1024x512.jpg 1024w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-1536x768.jpg 1536w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-2048x1024.jpg 2048w\" alt=\"\" width=\"2560\" height=\"1280\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>After the pandemic and other problems showed vulnerabilities, hackers sponsored by nefarious states could attempt to cause more supply chain problems, cybersecurity expert warns fleets. ORLANDO, Florida\u2014There\u2019s never been a known successful cyberattack on a U.S. commercial vehicle, but that doesn\u2019t mean they aren\u2019t vulnerable to cybercriminals. It\u2019s quite possible that some U.S. enemies already&#8230;<\/p>\n","protected":false},"author":3,"featured_media":13543,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[18],"tags":[361],"_links":{"self":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/13542"}],"collection":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/comments?post=13542"}],"version-history":[{"count":1,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/13542\/revisions"}],"predecessor-version":[{"id":13544,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/13542\/revisions\/13544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media\/13543"}],"wp:attachment":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media?parent=13542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/categories?post=13542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/tags?post=13542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}