Categories: HackingSecurity

Car hacking, cinematographic fiction or reality

Car hacking is today possible due the massive introduction of technology in our vehicles, a hacker that gain access to our vehicles.

Car hacking is one of the effect of the massive introduction of technology in our vehicles, a hacker that gain access to our transport is an event that we have seen only in movies.

Put a car and one of most popular hackers, Charlie Miller and you can obtain an explosive mix, it’s a pity that the presentation on car hacking has been excluded from the next Black Hat security conference.

Miller (@0xcharlie), one of most appreciated security experts and today in force at Twitter company, demonstrated his capabilities proposing various exploits to the security community such as the hacks for both the iPhone and the G1 Android phone,  he has also won four times the CanSecWest Pwn2Own competition.

Charlie Miller and Chris Valasek, director of security intelligence at IOActive will present a speech titled “Adventures in Automotive Networks and Control Units at next Defcon 21 in August.

The two researchers promise to approach car hacking under a new perspective, providing details and release tools to break into car control systems.

car hackingcar hacking

Following the abstract related to the presentation that will explore security issues related to car network systems and the possibility to direct interaction with principal components of a vehicle including braking and steering.

“Automotive computers, or Electronic Control Units (ECU), were originally introduced to help with fuel efficiency and emissions problems of the 1970s but evolved into integral parts of in-car entertainment, safety controls, and enhanced automotive functionality.

This presentation will examine some controls in two modern automobiles from a security researcher’s point of view. We will first cover the requisite tools and software needed to analyze a Controller Area Network (CAN) bus. Secondly, we will demo software to show how data can be read and written to the CAN bus.

Then we will show how certain proprietary messages can be replayed by a device hooked up to an ODB-II connection to perform critical car functionality, such as braking and steering.Finally, we’ll discuss aspects of reading and modifying the firmware of ECUs installed in today’s modern automobile..” 

 

Today the vehicles are equipped with connected computers that could be exploited by an attacker for various purposes, to prevent similar offensive US auto-safety regulator decided to start a new office focusing on these categories of cyber threats.

David Strickland, head of the National Highway Traffic Safety Administration declared:

“These interconnected electronics systems are creating opportunities to improve vehicle safety and reliability, but are also creating new and different safety and cyber security risks,”

Today car hacking could be conducted to exploit new generation vehicles that are even more connected to the Internet, with each other and to wireless networks. Controllers that equip today’s cars are very sophisticated,  to give you an idea of this complexity consider that today’s a luxury car has more than 100 million lines of computer code, while software and electronics account for 40% of the cost of the car.

How could be possible the car hacking?

Following some of most accredited methods of attacks:

  • Exploit of Telematics System – a hacker could exploit system installed on the car to remotely arrest a stolen vehicle. Gaining the access to a vehicle the attackers could also interact with every component on the vehicle through CAN bus.
  • Malware exploits – A malware could be inoculated through USB devices into MP3 reader or via wireless technology (WiFi or Bluetooth)
  • Unauthorized Applications – Executing or downloading malicious unauthorized app from third party, let’s think to the update to a build in navigation system.
  • OBD – specifically written software could exploit the OBD-II (On-board diagnostics) port for their installation, once accessed to the connector via the CAN bus it is possible to monitor every component connected to it.
  • DOOR LOCKS and KeyFob – an attacker could emulate the presence of access code which regulates the operation  of  these two systems, in this way he could control locks and start/stop for car engines.

Has never been intentionally caused an accident?

It’s not clear in reality, recently the tragic death of journalist Michael Hastings was considered by some journalist very suspicious … accidental incident or car hacking, this is the doubt.

Former U.S. National Coordinator for Security, Infrastructure Protection, and Counterterrorism Richard Clarke has shared with The Huffington Post his perplexities with the mysterious death.

He revealed that the crash and burn of Hastings’ car are compatible with a cyber attack against the vehicle, but that it’s impossible to tell whether it really happened that way due to the fire that enveloped the car after the crash in a tree. All traces are gone!

“What has been revealed as a result of some research at universities is that it’s relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn’t want acceleration, to throw on the brakes when the driver doesn’t want the brakes on, to launch an air bag,”

“I think you’d probably need the very best of the U.S. Government intelligence or law enforcement officials to discover it. So if there were a cyber attack on the car – and I’m not saying there was – I think whoever did it would probably get away with it,” he added.

In two to 5 years, security will be considered a primary requirement for a new generation of vehicles … have you updated the firewall on your car?

Pierluigi Paganini

(Security Affairs – Car hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Meta stopped covert operations from Iran, China, and Romania spreading propaganda

Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…

14 hours ago

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator

The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…

24 hours ago

ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…

1 day ago

Victoria’s Secret ‘s website offline following a cyberattack

Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…

2 days ago

China-linked APT41 used Google Calendar as C2 to control its TOUGHPROGRESS malware

Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…

2 days ago

New AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor.

GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…

2 days ago