CyberHappenings logo
☰

Track cybersecurity events as they unfold. Sourced timelines, daily updates. Fast, privacy‑respecting. No ads, no tracking.

Undocumented Radios Found in Solar-Powered Highway Infrastructure

First reported
Last updated
πŸ“° 1 unique sources, 1 articles

Summary

Hide β–²

The US Department of Transportation's Federal Highway Department issued an advisory on September 10, 2025, alerting highway agencies and infrastructure firms to scan solar-powered highway infrastructure for undocumented radios hidden in batteries and inverters. These radios, while not necessarily malicious, could be exploited for malicious purposes. The advisory comes amid increasing scrutiny of supply chain risks from inexpensive goods, particularly from China. The presence of undocumented radios in critical infrastructure poses a security risk, as they could be used to gain unauthorized access or disrupt operations. This issue highlights the broader vulnerability of operational technology (OT) in critical infrastructure, which has seen an increase in ransomware attacks targeting manufacturers, energy firms, and industrial sectors.

Timeline

  1. 12.09.2025 16:00 πŸ“° 1 articles Β· ⏱ 1d ago

    US Department of Transportation Issues Advisory on Undocumented Radios in Solar-Powered Highway Infrastructure

    On September 10, 2025, the US Department of Transportation's Federal Highway Department issued an advisory alerting highway agencies and infrastructure firms to scan solar-powered highway infrastructure for undocumented radios hidden in batteries and inverters. These radios, while not necessarily malicious, could be exploited for malicious purposes. The advisory highlights the broader vulnerability of operational technology (OT) in critical infrastructure, which has seen an increase in ransomware attacks targeting manufacturers, energy firms, and industrial sectors.

    Show sources

Information Snippets

  • The US Department of Transportation's Federal Highway Department issued an advisory on September 10, 2025, regarding the presence of undocumented radios in solar-powered highway infrastructure.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources
  • The advisory highlights the risk of undocumented cellular radios in batteries and inverters, which could be exploited for malicious purposes.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources
  • The advisory comes amid increasing scrutiny of supply chain risks from inexpensive goods, particularly from China.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources
  • Undocumented radios in critical infrastructure could be used to gain unauthorized access or disrupt operations.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources
  • Ransomware attacks targeting OT increased by 87% in 2024, affecting manufacturers, energy firms, and industrial sectors.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources
  • Many OT devices include radios by default or for maintenance purposes, often undocumented.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources
  • China is amassing a large network of devices as part of its Salt Typhoon and Volt Typhoon efforts, potentially to understand US critical infrastructure.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources
  • Asset discovery and hardware bills of materials can help identify vulnerable components and mitigate risks.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources
  • Monitoring network connections and east-west traffic is crucial to detect lateral movement by attackers.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources
  • There is a growing trend towards 'least functionality' programming and a greater focus on Software Development Life Cycle (SDLC) basics in device manufacturing.

    First reported: 12.09.2025 16:00
    πŸ“° 1 source, 1 article
    Show sources