/Courtesy of SK shieldus

SK shieldus said on the 26th that it participated in the global security hacking conference "Pwn2Own Automotive 2026," reported security vulnerabilities in electric vehicle (EV) chargers, and contributed to strengthening cybersecurity amid the shift to vehicle electrification.

Pwn2Own Automotive is a global hacking conference that verifies security vulnerabilities across vehicle-related systems such as completed vehicles, in-vehicle infotainment systems, and EV chargers, and it operates by having security researchers around the world demonstrate and report undisclosed vulnerabilities. The event was held in Tokyo, Japan, from the 21st to the 23rd.

SK shieldus participated in the event based on the results of its white-hat hacker group EQST (Experts, Qualified Security Team). EQST discovered and reported security vulnerabilities in the Smart 40A model of EV chargers from the manufacturer Grizzl-E.

As electrification, Autonomous Driving, and connected technologies spread in the automotive industry, consolidation between vehicles and external infrastructure is expanding. Accordingly, EV chargers have become core infrastructure that works with vehicles and networks beyond simple power supply equipment, and if hacked, they could lead to various damages such as charger paralysis, billing manipulation, and interference with charging control, making security increasingly important. This vulnerability report is evaluated as a meaningful achievement in raising the security level of EV charging infrastructure.

An SK shieldus official said, "Through this participation in Pwn2Own Automotive, we once again confirmed the importance of cybersecurity in the process of automotive electrification and the shift to software-centric systems," adding, "We will continue to help strengthen the ability to respond to cyberthreats across various industries based on our global security research experience."

※ This article has been translated by AI. Share your feedback here.