All India EVAll India EVAll India EV
Notification
Font ResizerAa
  • Home
  • EV News
  • EV Launch
  • Market Insights
  • Investments & Funding
  • Guest Articles
  • EV Engineering
  • Contact
Reading: Are India’s EV chargers safe? Chinese-made components raise fresh cybersecurity alarms
Share
All India EVAll India EV
Font ResizerAa
  • Bussiness
  • Home
  • News
  • The Escapist
  • Electric
  • Entertainment
  • First Drives
  • Science
  • Hybrids
  • Technology
  • Blog
  • Insider
  • Contact
Search
  • Home
    • Home 1
    • Home 2
    • Home 3
    • Home 4
    • Home 5
  • Home
  • Categories
    • Electric
    • First Drives
    • Hybrids
  • Categories
    • Technology
    • Entertainment
    • The Escapist
    • Insider
    • Bussiness
    • Science
    • Health
  • Shows
    • Rap
  • More Foxiz
    • Blog Index
    • Contact
  • Bookmarks
    • Customize Interests
    • My Bookmarks
  • More Foxiz
    • Blog Index
    • Sitemap
Have an existing account? Sign In
Follow US
EV Chargers
Home » Blog » Are India’s EV chargers safe? Chinese-made components raise fresh cybersecurity alarms
Market Insights

Are India’s EV chargers safe? Chinese-made components raise fresh cybersecurity alarms

Sunita
By
Sunita
Last updated: 18 October 2025
Share
11 Min Read
SHARE

Volza Data Reveals 80–85% of EV Charger Components in India Imported from China, Highlighting Heavy Dependence on Chinese Supply

Contents
  • The backdrop: JLR attack and India’s charger ambitions
  • Why Chinese components pose a cyber-risk
  • Policy, localization, and gaps in oversight
  • The urgency: India’s EV expansion and security imperative
  • What it will take: securing India’s EV future
  • Conclusion

A recent cyberattack on Jaguar Land Rover (JLR), which forced the automaker to suspend operations at three of its UK facilities for nearly a month, has reignited debate about cybersecurity across the global auto industry — and it has triggered new scrutiny of India’s fast-growing electric vehicle (EV) ecosystem.

As India embarks on an ambitious plan to install over 72,000 public EV charging stations under the PM E-Drive scheme by FY28, industry insiders and cybersecurity experts warn that heavy reliance on Chinese components in EV chargers could introduce serious vulnerabilities — from vehicle hijacking to grid-level intrusion.


The backdrop: JLR attack and India’s charger ambitions

The JLR breach, though external to India, has served as a warning: auto and mobility infrastructure are now high-value cyber targets. In that case, attackers reportedly gained footholds in IT systems tied to factory operations, forcing a near-month downtime at multiple plants.

In India, the timing is sensitive. The government has earmarked about ₹2,000 crore to underwrite the expansion of public charging infrastructure. Under PM E-Drive, the state will cover up to 80% of upstream infrastructure costs (cables, transformers, power supply) and 70% of the EVSE (charging equipment) costs in cities and along highways; for chargers on government premises, it will subsidize 100% of costs. In parallel, the policy mandates localization of 12 key components (software modules, charging guns, panel boards, etc.).

However, despite policy nudges, industry participants estimate that localization hasn’t exceeded 50%, and 80–85% of charger components in India are still imported from China according to trade data from Volza.

That dependence leaves India exposed at a time when Beijing has tightened export controls on lithium-ion batteries and rare-earth magnets, two critical inputs for EVs, heightening worries about supply chain chokepoints.

More EV News

IIT Madras Leads India’s eMobility Transition with Government Projects
CEA Suggests Guidelines for Grid-to-Electric Vehicle Charging
What is difference between Autocharge and Plug & Charge?
Buying, renting or subscribing to EV in India
Electric Scooter sales hit best in first 7 months of FY2024

Why Chinese components pose a cyber-risk

India’s EV charging infrastructure may be vulnerable not only to electrical faults but to cyber threats built into hardware, firmware, or data links. As EVSEs evolve into smart, connected devices, their cybersecurity posture becomes as vital as their electrical safety.

“A charger today is not just a power device; it is a digital interface that talks to the vehicle, the grid, and the user’s app,” said Anshuman Divyanshu, CEO of Exicom’s EVSE unit. The integrity of hardware, firmware and communication pathways is central to securing the network.

One particular risk arises from how chargers communicate with a vehicle’s internal systems — especially via Vehicle-to-Grid (V2G) or Vehicle-to-Infrastructure (V2I) protocols. According to Shantanu Das, chief architect at Sasken Technologies, malicious actors could exploit these links for unauthorized diagnostics, ECU flashing, or deeper system manipulation.

The danger extends beyond vehicles: EV chargers are connected to power grids, network back-ends, payment gateways and cloud systems. A compromised charger could thus act as a pivot to attack broader infrastructure.

An Electronic Control Unit (ECU) in an EV orchestrates functions from battery management to diagnostics. If an attacker gains control over any component connected to or communicating with the ECU, they could disrupt charging or, in extreme cases, remotely disable vehicles.

Sharif Qamar, Associate Director at TERI, notes that sometimes EVs built in China may cross into India and use our charging infrastructure. The complexity of software and hardware interactions in such cases introduces data and informational vulnerabilities.

A senior executive at a charging infrastructure firm (speaking on condition of anonymity) added that the interface between the charging gun connector and the battery management system is especially sensitive — EV manufacturers must carefully control how much data flows across this interface.

While India has not yet experienced a widely documented charger hack, global incidents reveal the risk is real: In 2023, Electrify America chargers were infiltrated via OS vulnerabilities. More recently, Tesla’s wall chargers were breached twice at the Pwn2Own Automotive 2025 contest in Tokyo, exposing weaknesses in EVSE systems.

In addition to software attacks, recent academic research has revealed physical-layer attacks: malicious devices inserted into charger connectors can inject signals that spoof authentication methods, causing denial of service or charger/vehicle control sabotaging. Another study demonstrated “charge manipulation attacks” on smart chargers, altering data flows to manipulate electricity demand behavior.

These risks are not theoretical — they reflect real-world vulnerabilities in common charging protocols (e.g. SAE, CCS, IEC, GB/T). 


Policy, localization, and gaps in oversight

While PM E-Drive’s subsidy scheme attempts to spur domestic manufacturing, the road ahead is challenging. Key issues:

  • Localization is slow: The PMP allows import of certain charger parts until a cut-off date to support ramp-up, but many software and hardware modules remain heavily dependent on overseas suppliers.
  • Lack of cybersecurity standards: Though chargers must be tested and approved by certified agencies, the government has not yet issued detailed cybersecurity guidelines specific to EVSE systems, leaving oversight gaps.
  • Dependence on imports: Even with incentives, many EVSE manufacturers still rely on foreign (mostly Chinese) chips, connectors, and power modules.
  • Recall risks and reputational damage: OEMs are increasingly wary of potential cybersecurity recalls and are pushing for higher local content in critical parts to reduce liability.

In response, companies such as Exicom are doubling down on their India-made software stacks. “Our chargers run on Exicom’s own OS, firmware, and controller architecture, all developed in India,” says Divyanshu. “Every layer is rigorously tested, encrypted, vetted — we consider it non-negotiable.”

Manasvi Sharma, CEO of EVERTA, emphasises the dual focus: while hardware localization is central, companies must continually evolve protocols and safety checks, because threats will intensify over time.


The urgency: India’s EV expansion and security imperative

India’s EV adoption is surging. In FY25, sales grew by 17% to 1.9 million units (according to the Vahan registry) — and analysts estimate the domestic EV sector, currently valued at US $137 billion, could reach $203 billion by 2030 (CAGR ~8.2%). 

Yet only about 4.8% (≈ 95,000) of those sold vehicles were electric cars; two years ago the share was just 2.6%. Meanwhile, India had ~29,200 public EV chargers as of August end, per data cited in the Lok Sabha. 

As charger density scales, the stakes of insecure infrastructure grow larger.

From a business perspective, local manufacturing not only unlocks subsidies but also helps win trust from charge point operators (CPOs), who increasingly demand secure, India-made systems.

Exicom, already manufacturing in Gurugram, is setting up a new facility in Hyderabad, slated to go live by end-2025. The company aims to derive 50% of its revenue from its EV charger business by 2030. 


What it will take: securing India’s EV future

To build a resilient, indigenous EV charging ecosystem, key actions are urgently needed:

  1. Formulate explicit cybersecurity standards for EV chargers
    The government should define mandatory cybersecurity protocols — akin to those in telecom and critical infrastructure — covering firmware encryption, secure boot, regular updates, anomaly detection, and certification.
  2. Promote secure design and supply chains
    Encourage domestic design of chips, controllers, communication modules, and ensure component-level vetting and audits. Incentivize developers to integrate zero-trust architectures and defend against spoofing or signal-injection attacks like “PORTulator.”
  3. Mandate end-to-end testing and penetration audits
    Beyond electrical safety certification, every EVSE should undergo vulnerability assessments, red-teaming, and field audits before deployment.
  4. Encourage architecture segmentation
    Charging infrastructure should separate networks: isolate payment/data networks, grid control, and vehicle comms, minimizing lateral attack paths.
  5. Mandate local firmware and OTA update control
    Encourage chargers to host firmware update mechanisms under local oversight. Imports of “black-box” firmware should be restricted.
  6. Establish incident response standards and reporting norms
    Require CPOs and charger OEMs to follow standardized protocols for breach disclosures, emergency patching, and network segmentation in case of compromise.
  7. Promote awareness and skill development
    Support training programs in EV cybersecurity for hardware engineers, firmware developers, and security auditors.
  8. Accelerate component manufacturing capacity
    Through incentives, R&D funding, and demand guarantees, nurture local component makers to reduce dependence on external suppliers — especially Chinese.

Conclusion

India’s ambitious green mobility push hinges not only on installing chargers, but on ensuring those chargers are secure. The spectre of imported vulnerabilities — whether hardware, firmware or signal-level — is real, and the cost of neglecting cyber risks could be steep: fleet-wide disruptions, vehicle hijacking, grid attacks, or reputational collapse.The JLR incident serves as a reminder: cyber threats don’t respect geography. For India, building a truly indigenous, trusted, cyber-secure EV ecosystem is not optional — it is a prerequisite for the grid to go fully electric. The next few years will test whether policy, industry and security converge fast enough to keep pace.

Join All India EV Community

Click here for more such EV Updates

Loading
Battery Passport: Paving the Way for a Transparent, Sustainable, and Secure EV Supply Chain in India
What is Battery Passport and why India needs it?
Companies working on the Next-Gen Batteries
What is V2G technology and why it is important?
Xpeng G6 2025 Unveiled: Turing AI and ‘Bulletproof’ EV Batteries Redefine Electric Mobility
As China Blocks Rare Earths, Chara and Torus Build India’s EV Resilience

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
Loading
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow US
XFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
Bhavish Aggarwal
Bhavish Aggarwal Pledges More Ola Electric Shares — Rising Founder Risk Concerns Investors
13 November 2025
India’s E-Bus
India’s E-Bus Tender Model Raises Concerns Among Manufacturers Despite Ambitious Expansion Plans
13 November 2025
Battery Swapping Revolution
India’s Electric Truck Market Shifts Gears with Battery Swapping Revolution
12 November 2025
All India EV: Sept-25
Everything that is happening in the INdian Ev marekt compiled in one publication just for you,,,
All India EV

Daily EV Industry updates for you…

Categories

  • EV News
  • EV Launch
  • Investments & Funding
  • Market Insights
  • Guest Articles
  • EV Engineering

Quick Links

  • Community
  • Content Services
  • Branding Services
  • My EV Charger
  • Substack

© Developed and Managed by “The Energy Log”

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up