ThreatHive, from Karamba Security, provides automobile OEMs and Tier 1 suppliers a view of actual, online attacks on their electronic control units (ECUs) during development. The company says the tool enhances its ECU protection portfolio with automotive threat intelligence.

Karamba Security’s ThreatHive implements a worldwide set of hosted automotive ECUs in simulation of a "car like" environment. These ECU software images are automatically monitored to expose automobile attack patterns, tools, and vulnerabilities in the ECU’s operating system, configuration, and code. The real attacks on the ECU during the development lifecycle provide actionable insights into security vulnerabilities, including industry software (like OS, development tools, and common libraries), that benefit the automotive security community.

By using hackers’ crowd effect, which attack the ECU software hosted in the honeypots, the offering expedites vulnerabilities discovery and reduces OEMs’ and Tier 1 suppliers’ investment in penetration testing during the narrow time window of product acceptance tests. The findings from the threat analysis tool are shared in an aggregated and anonymized way to help vehicle OEMs and Tier 1 suppliers secure ECUs from hackers, as part of Karamba Security’s strategic partnership with US Auto-ISAC.

ThreatHive works with Karamba Security’s Carwall, in-vehicle security software that automatically secures connected cars against cyberattacks. Carwall keeps connected and autonomous cars safe by sealing the car’s ECU software, so it automatically prevents cyberattacks from infiltrating the vehicle and compromise consumer safety. Together the products build out Karamba Security’s ECU protection portfolio to keep autonomous and connected cars safe from cyberattacks during development and in production.