Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Transportation

Remote Control of a Car, With No Phone Or Network Connection Required 160

Albanach writes: Following on from this week's Wired report showing the remote control of a Jeep using a cell phone, security researchers claim to have achieved a similar result using just the car radio. Using off the shelf components to create a fake radio station, the researchers sent signals using the DAB digital radio standard used in Europe and the Asia Pacific region. After taking control of the car's entertainment system it was possible to gain control of vital car systems such as the brakes. In the wild, such an exploit could allow widespread simultaneous deployment of a hack affecting huge numbers of vehicles.
This discussion has been archived. No new comments can be posted.

Remote Control of a Car, With No Phone Or Network Connection Required

Comments Filter:
  • by Anonymous Coward on Friday July 24, 2015 @05:33AM (#50173443)

    "Car infotainment systems can allow drivers to see vehicle status updates, play music and videos, view maps and in some cases run third-party apps" - and they also allow drivers to NOT SEE OTHER CARS, while they're trying to use a stupid touchscreen in a bloody CAR...

    • I really do wish they went with side buttons instead of touch screens. You can memorize positions and even feel your way to the right button. Until cars have haptic feedback on their screens they should stick to buttons. I should be able to operate it blindly.

      • by TWX ( 665546 )
        I don't see why most interface information needs to be on a screen anyway. When I use the GPS on my phone while driving I've found that if I put the phone into the disused ashtray a certain way it echoes very well and I can hear the instructions as if a person was sitting in the car with me. I don't need a visual indication when the highways are well marked and the GPS is basically providing me with a rough guide.

        I don't need my car stereo to tell me the name of the musician or song on a screen. The n
        • I don't need my car stereo to tell me the name of the musician or song on a screen.

          I need that much. I currently get by with a one-line segmented LCD. Would like to have at least two lines, so I'll probably end up with a touch screen in my future.

          This is partly because I also use my radio for playing podcasts from USB.

          • How many accidents in the last 5 years?

            • One rear-end at a red light by someone who didn't see the "no turn on red" sign.

              • What does that mean? You rear ended him, but it was his fault?

                • It means he rear-ended me and that he was at fault.

                  • Rear ended by someone making an illegal right on red? I don't get it.

                    Anyhow, by focusing on driving I'm in my 4th decade of accident free driving, including a number of 'not at fault accidents' that I avoided via situational awareness.

                    • I was at the red light in front of them in the right turn lane. They thought I was turning and they punched the gas. It's not that hard to understand.

    • by plopez ( 54068 )

      Yep. It's not much different that texting. You have to look away, read, and then touch a UI.

  • Why?? (Score:5, Insightful)

    by Munchr ( 786041 ) on Friday July 24, 2015 @05:36AM (#50173451)
    Why exactly is the entertainment system of a vehicle, devoloped by design to display "unknown" content, tied into critical systems? First airplanes and now cars. What the actual fuck are these people thinking?
    • Re: (Score:3, Informative)

      by Anonymous Coward

      It is probably tied into the CAN bus to respond to nifty steering wheel buttons.. but indeed. wtf.

      • by sjames ( 1099 )

        It wouldn't be so bad if they would place a proxy between the critical systems and the infotainment such that the critical systems were effectively read only (so long as the proxy was a separate box that NEVER accepts commands from the infotainment side), but HEY, what's a few fatal brake failures when they can save 5 bucks?

    • Re:Why?? (Score:5, Insightful)

      by invictusvoyd ( 3546069 ) on Friday July 24, 2015 @05:45AM (#50173481)
      Hyper integration . Top-end car buyers grin when they hear things like voice recognition ignition system. That level of integration is bound to introduce some security holes. They just have to be patched.
      • Re:Why?? (Score:5, Insightful)

        by Anonymous Coward on Friday July 24, 2015 @06:13AM (#50173539)

        Flash has millions (maybe billions) of users and after 15 years, they still find 0-day security holes. There's no "just" about it.

        • I wish I had a million mod points. Security is *hard*.

          The essence of a secure system is one which doesn't connect to any systems which have a lower security threshold.

          • by Bengie ( 1121981 )
            The first step to security is making sure the instructions are coming from a trusted source. If you're not going to do any validation, then don't make your system publicly accessible. This isn't an issue of security being hard, its an issue of not even trying.
            • > its an issue of not even trying.

              It's hard to disagree with this statement, although we do not know all the details. Compare to computers—we have insecure OS's running insecure servers on insecure networks, and then people realized that maybe all this should be retrofitted with security without losing a single capability or backwards compatibility. That's definitely hard. On the other hand, we have had cars secure from RF-based attacks for a hundred years, and now suddenly they become insecure w

            • The trusted source should be the auto service center. Even if you get a trusted over the air source, it should never be trusted unless the owner is involved and actively approves the transaction. Sure, flash a message on the screen first: "warning, the 432nd zero day flaw has been found on this system and an update is available", but don't install the patch without permission from the owner.

              The sole reason they want this updates is because of a stupid entertainment system! Screw that, disallow updates ov

          • Security is not that hard. What is making it hard comes from trying to keep security in a design that is actively fighting against security. Keeping things simple makes security simple. Trying to allow a system to do everything, including updating your OS over the air or accepting and executing arbitrary code that appears over the air, turns the security into a nightmare task that will never be completely finished.

            The key concept is that convenience is the enemy of security, and vice versa. The two do n

        • Because Flash doesn't keep things simple. They go out of their way to screw over the user by adding unsafe concept (not just unsafe features). If they make the program so that it can only do presentations then it's a safer product. But instead they want to write files to your computer, hook up to DLLs, allow random byte codes from the internet to control operations that can potentially be unsafe.

          It's like the difference between using pure HTML 1.0 where you had nothing but markup and could only do a pres

      • They just have to be patched.

        Wrong attitude about security, Patchy Patcherson.

      • What does that have to do with anything? Unless you want your voice recognition system to be able to activate the brakes the two systems should be fully airgapped. Parallel networks, one secure, one insecure, are hardly a new idea.

    • by Anonymous Coward

      Speculation: It's all on one network so you can install updates using that single network. As the previous Wired article discussed, users don't install updates if it's inconvenient (via a USB stick). Imagine having separate networks with separate USB ports and separate system updates! Besides the added cost and complexity due to duplicated hardware, nobody would ever bother. But some updates probably *are* useful, for fuel efficiency and whatnot.

      • Re: (Score:3, Insightful)

        by Anonymous Coward
        They should have separate networks with separate update mechanisms.
        1. The main engine computer and network should rarely, if ever, need to be updated, unless it's something like a vehicle recall. Putting a USB port in a somewhat obscure or hard to access place would be fine for this, as it would normally be done by a dealer or by someone who is very motivated and knows what they're doing.
        2. The cosmetic functionality should be easily updated by anyone at anytime, as it's more likely to receive user inter
    • NSA (Score:2, Insightful)

      by Anonymous Coward

      Same reason why they leave backdoor in encryption mechanisms.

      We used to think the reason was incompetence, post Snowden we know these vulnerabilities are by design.

    • Well I can understand the need for the display to show critical content. I would love it if my entertainment display would give me the exact reason why the warning lights came on.

      however what gets me is why is it a two way connection? That should be read only data. You should not be adjusting things from that system.

      • Re:Why?? (Score:5, Interesting)

        by 91degrees ( 207121 ) on Friday July 24, 2015 @07:52AM (#50173803) Journal
        I think there's a lot of speculation in the article being represented as fact. Reading the article, it doesn't look like the researcher actually did manage to control the car through the radio. Just suggested that it might be possible to do so.

        Still, using the suggestion in the article, it might be possible to instruct the car to parallel park if this is operated using a touch screen through the "infotainment" system. Seems unlikely that such a system would operate any fundamental car functionality though.
    • If you own an american muscle car, the only way you'll know your engine is powerful enough for your manly image is if they add engine sounds to the cabin. They *have* to have a link to the ECS of they won't know how much manliness to tell you you're creating with your throttle.

    • by sjbe ( 173966 ) on Friday July 24, 2015 @07:55AM (#50173809)

      Why exactly is the entertainment system of a vehicle, devoloped by design to display "unknown" content, tied into critical systems? First airplanes and now cars. What the actual fuck are these people thinking?

      I work in the auto industry running a company that manufactures electronic wiring products. I can tell you exactly what they were thinking.

      Nothing. They weren't thinking about it at all.

      Auto makers have never had to deal with security much beyond ignition and door locks and car alarms. The concept of hardening the internal system of a car against malicious hackers is really something they've never really had to deal. The fact that there are asshats out there who will do malicious things simply hasn't been an issue for them until now. It's more ignorance than incompetence. Their electronics experience is more embedded systems than consumer electronics and they've built their companies accordingly.

      I do think it is dawning on them but its going to take some years before they get their house in order. It will require some significant organizational restructuring and changes in development and engineering. I think you'll likely see some hacking incidents and some sizable lawsuits along the way. They will almost certainly have to get handed some very expensive lessons before they get religion about doing security properly.

      • It's more ignorance than incompetence.

        No. Incompetence is ignorance when you can hire someone competent and aware. But that's not what they did. They hired incompetent, ignorant idiots.

        • by sjbe ( 173966 ) on Friday July 24, 2015 @09:30AM (#50174281)

          Incompetence is ignorance when you can hire someone competent and aware.

          That is an argument from hindsight. It's easy to see the problem in the rear view mirror. How do you propose they go about hiring someone "competent and aware" when they don't know about the existence problem in the first place? It's REALLY easy to armchair quarterback this and it's pretty unfair. The real question is what they will do going forward because the leadership damn well ought to be aware of it now. If they continue with business as usual THEN it is fair to say they are incompetent.

          They hired incompetent, ignorant idiots.

          Untrue and unfair. The problem is that they hired good people people to do the wrong task because they didn't know any better. I assure you that the people they hired were by and large competent at what they were hired for. I work with many of these engineers. They aren't stupid. They aren't incompetent. They ARE naive about computer security and how to design systems with that in mind.

          It's a problem they will likely deal with effectively in due time but there are going to be some painful lessons learned along the way. Companies that have made their money cutting metal don't become advanced IT operations overnight.

          • How do you propose they go about hiring someone "competent and aware" when they don't know about the existence problem in the first place?

            You ask an expert. If you're not smart enough to do that, then you're an idiot and you deserve to fail. And that's what the automakers are doing: they are failing at computing. Security is part of computing.

            The problem is that they hired good people people to do the wrong task because they didn't know any better.

            And they didn't know any better because they didn't consult the experts, and they didn't consult experts because they are idiots, who deserve to fail. Like I said.

          • by Anonymous Coward

            That is an argument from hindsight. It's easy to see the problem in the rear view mirror. How do you propose they go about hiring someone "competent and aware" when they don't know about the existence problem in the first place?

            There's one problem with your argument. The people who were ignored when they said that cars were going to be vulnerable to exploits just like every damn thing we connect to the internet is vulnerable.

            To accept your argument, there has to be some modern education system where people can learn enough about digital electronics and programming, but have never heard about the internet.

            And they are still at it. Chevy now not only has OnStar, but a lot of them are now 4G integrated. All perfectly safe, and u

          • by Bengie ( 1121981 )
            Sounds like you're saying if a first time mother never fed her child, it wasn't her fault, she was a first time mother.
          • Because they put a FRICKIN COMPUTER in the car, and then they go on the internet or watch TV and hear that HEY, SOME PEOPLE OUT THERE ARE BREAKING INTO COMPUTERS yet they are "ignorant" of the possibility.
          • by sjames ( 1099 )

            I don't think the idea that hackers might have excessive fun with a computer controlled system is such an obscure thought to have in the 21st century. Especially since they have been REPEATEDLY warned in public and in private about the risk for over a decade.

            This wasn't just ignorance, it was WILLFUL ignorance.

            Hey, look out for that piano! It's about to fall on your head!!! MOVE!!!...RUN FOR YOUR LIFE!!!!!!!!!!!

            (5 seconds later) CRASH! Well, to be realistic, how could he possibly have anticipated a piano fa

        • They're not idiots, security just hasn't needed to be a big part of the discipline. Interconnected cars is still a relatively novel concept, though not brand new. It's not that hard to understand why security would be an afterthought in automotive. Immediate safety and cost concerns take precedent. Would you rather have manufacturers focus on making sure there are no safety issues with the controller, or protecting against hypothetical future safety concerns? Until very recently, the vast majority of vehicl
        • by njnnja ( 2833511 ) on Friday July 24, 2015 @10:29AM (#50174691)

          If a carmaker builds a car that explodes in a normal accident, then they are negligent. But if they build a car that explodes when someone fires an RPG at it, I don't blame the automaker.

          The kind of hack that takes control of a car and disables the brakes is not an accident. It is like someone cutting the brake lines. And we don't require car manufacturers to make brake lines out of triply reinforced kevlar and steel so that people can't maliciously cut through them, nor require automakers to wrap the car in fireproof material in case somebody douses it in gasoline and sets fire to it. They just need to be enough to make it through standard operating conditions, not outright attacks.

          There will always be security holes as long as there is enough reason for someone to want to take control of a car. So although I think it is a good idea for carmakers to build better systems ("Mercedes Benz - the only luxury car that isn't affected by the ZeusMobile trojan!"), I think assigning liability in hindsight is a bit harsh. But some additional regulations that require some of the obvious best practices (air-gapped systems, etc) would also make sense.

          • by Nkwe ( 604125 ) on Friday July 24, 2015 @11:37AM (#50175217)

            They just need to be enough to make it through standard operating conditions, not outright attacks.

            As soon as you connect something to the Internet, "standard operating conditions" include outright attacks.

          • "The kind of hack that takes control of a car and disables the brakes is not an accident. It is like someone cutting the brake lines. And we don't require car manufacturers to make brake lines out of triply reinforced kevlar and steel so that people can't maliciously cut through them, nor require automakers to wrap the car in fireproof material in case somebody douses it in gasoline and sets fire to it. They just need to be enough to make it through standard operating conditions, not outright attacks. "

            I do

          • Yes, but brake lines are needed, where as communication systems permitting external input are not needed. When vulnerabilities are created by add-on features that aren't truly necessary, but expose life safety and theft risks, that can be negligence. I hope out of this issue, that message is understood before lawmakers start mandating V2V communications.

    • Why exactly is the entertainment system of a vehicle, developed by design to display "unknown" content, tied into critical systems? First airplanes and now cars. What the actual fuck are these people thinking?

      Beancounters.

      • by sjbe ( 173966 ) on Friday July 24, 2015 @08:20AM (#50173883)

        Beancounters.

        Nope. I'm both an engineer and an accountant and I'm in the industry. I can assure you that the beancounters had close to zero input on these design decisions and that is pretty much routine. Most of the beancounters aren't engineers and aren't really in a position to challenge the engineers on design decisions. These systems were designed by engineers and I can tell you with near 100% certainty that the design engineers had no background in security because I deal with engineers like this routinely in my day job. Basically the beancounters don't get involved much beyond helping to set the budget and keeping people to it but they rarely get involved in the mundane design decisions of exactly how the product will be built.

        Let me give you an example from my own company about how little input the beancounters have. My company makes wire harnesses and one of our products goes into a series of SUVs from GM and is used across several brands. We make two versions that are identical except for one part. The reason we use two parts instead of one is because the engineers at Chevy couldn't be bothered to talk to the engineers at Buick to make a common hole size. This raised cost and added a part number for no reason at all. The beancounters didn't get involved and never said a word.

        But it gets worse. The same product uses connectors on each end. The engineers could have used common, off-the-shelf, already-in-production connectors but instead they decided to custom design the connectors on both ends. As a result they more than doubled the unit cost of each connector and instead of having a part that could be purchased with zero lead time from any distributor, we have a 16 week lead time, continual part shortages and have to buy over 50,000 units at a time (we use about 1,000/day) to get the pricing we get. So we end up selling them the product for probably 30% more than was necessary because of stupid design decisions. The beancounters never said a word about any of this foolishness either.

        • As a professional technician - not totally surprised. Though I must say, I was a little surprised to find an oxygen sensor harness run adjacent to a driveshaft yoke (12 codes, 3 fuses, and a lot of wire repair later...) in an Escalade - presumably consistent with all AWD models of Tahoe/Suburban/etc.
        • by pnutjam ( 523990 )
          Most people aren't aware how many very competent engineers and technicians are out there, who don't know jack about security. It's never been an issue for them, but all of a sudden, here comes the internet.

          Even these systems that are not connected to the internet suffer the internet effect. How hard would it be to publicize an exploit like this in 1984?
    • As far as I know, the airplanes thing has never been proven. The avionics is not linked to the entertainement system on a plane. That was highly speculative. Cars is another thing.
    • Why exactly is the entertainment system of a vehicle, devoloped by design to display "unknown" content, tied into critical systems? First airplanes and now cars. What the actual fuck are these people thinking?

      As other people have noted, it's probably related to CAN bus integration.

      I like CAN bus, but this sort of implementation reflects a problem across industries. Years ago, when engineers ran the show, you'd never connect mission critical networks to anything. Then slowly, as engineers lost cachet to the IT and Accounting teams, the arguments for separate networks got howled down over calls for efficiency and cost-cutting.

      Engineers knew their networks were insecure - in part because of the reliance on in

    • It's the same elsewhere. Idiots want their programs to do everything. If it's convenient, then do it, and only luddites would want it differently. Ie, Adobe Reader, a program that *reads*, keeps having to have security patches because that *reader* was changed to do complex crap that no one ever asked for above and beyond just presenting information. They could have left the format completely as a read-only format, lock down the byte codes to be safe, never even link in a function that writes to a file.

  • by Nikademus ( 631739 ) * <renaud.allard@it> on Friday July 24, 2015 @06:07AM (#50173525) Homepage

    He believed an attack could be done via a DAB broadcast, but from the article, he doesn't seem to have tried on a real car.

    That said, car companies do a lot of idiot stuff these days, like the trunk which opens automatically when you put your foot under the car and you are nearby. This is just a big gift for thieves, just wait for tourists with a car full of stuff to leave their car, stand in the vicinity and put your foot under the car when they leave but they are still near enough to allow the trunk to open...

    • by Anonymous Coward

      Did you even read the article?... He has proved the attack works in controlled environments where the DAB signal can't reach outside, on a car.

    • by antdude ( 79039 )

      Which car brands and models have these holes?

    • I have a car with a fast key, though you have to push a button on the trunk. I'm gonna say your concern is unwarranted. The range of the fast key for the trunk sensor is very short, not more than 2 or 3 feet centered in the back of the trunk. There's simply no conceivable way a shady character could surreptitiously be that close without me noticing them.

      • The range of the fast key for the trunk sensor is very short, not more than 2 or 3 feet centered in the back of the trunk.

        The MO of the thieves unlocking the cars with keyless entry FOBs is that they're using some kind of transmitter/amplifier [nytimes.com]. It basically acts like a man in the middle, rebroadcasting signals from the car and FOB at higher power to greatly increase the range.

        It all boils down to a foolish decision by automakers that there was always a 100% correlation between signal strength and dis

      • Actually people are breaking in using this feature. It involves using a box with an antenna and broadcaster. When you are 100 feet away (possibly in a building), they use the box to boost the signal and make the car believe you are 2 feet away.
    • like the trunk which opens automatically when you put your foot under the car and you are nearby. This is just a big gift for thieves, just wait for tourists with a car full of stuff to leave their car, stand in the vicinity and put your foot under the car when they leave but they are still near enough to allow the trunk to open...

      Awe, isn't that cute, you're talking about shit you know nothing about.

      In order for that trunk to open, your key has to be within about 1/3rd of a meter from the trunk lock or it doesn't open, so if I'm close enough that you can get into the trunk that way, I'm also close enough to just beat your ass for trying, since you two are going to be well within my striking distance at that point. You'd be hard pressed to get your foot under there with me close enough because I'm going to be in between you and the

      • by 0123456 ( 636235 )

        Same for the doors, you have to be within about a foot of the door. You can't unlock the doors from the outside when the key is on the inside. You can't unlock or open any of the doors with the key at or more than a meter away from the door you're trying to unlock.

        Except there was an article a few weeks ago about crooks breaking into cars by using a directional antenna to pick up the signal from your key and retransmit it to the car.

  • by Anonymous Coward on Friday July 24, 2015 @06:17AM (#50173543)

    WTF are the ass clowns who produce this shit thinking ? Have they been in a cave for the last 30 years ?

    All these so called "smart devices" seem to have been programmed by 5 year old children who have never considered that malicious people might try to crack/exploit their systems.

    10 minutes after the "Internet Of Things" is in place the world is going to descend into chaos as every script kiddie on the planet starts fucking around with stuff and exploiting every single one of the devices. Probably just by using the default admin password which will be printed on the box.

    Honestly I can't believe how truly abysmal the state of most modern programming is. Piss poor code running on umpteen frameworks (mostly just adding bloat) and every bit of it seemingly written without the FIRST THOUGHT to security. Fucking fifth rate crap the lot of it.

    You can take all your smart TVs, smart cars, smart fridges etc. and stick them right up your arse. None of this shit is coming into my house ever. Morons....

  • potentially (Score:5, Interesting)

    by Mirar ( 264502 ) on Friday July 24, 2015 @06:20AM (#50173547) Homepage

    "Because infotainment systems processed DAB data to display text and pictures on car dashboard screens, he said, an attacker could send code that would let them take over the system.

    Once an infotainment system had been compromised, he said, an attacker could potentially use it as a way to control more critical systems, including steering and braking."

    Well, yeah.

    Normally it's not that easy. Sure, the car stereo sits on a can bus with nice information (ACC, backing signals to turn on the back camera, speed information so the volume can be automatically adjusted, etc). But it's not on the vital CAN bus (at least not on most cars).

    But yes, it's an entrance point. So is the 3g/wifi receiver in the stereo, or the bluetooth connection to the handsfree that it can do.

    But you would have to:

    1. crack an entrance point to the stereo (any of the above)
    2. control the stereo CAN transmitter (if it has one)
    3. using that CAN to crack an entrance point to another system that talks to a vital CAN bus
    4. control that system enough to transmit CAN on the vital bus
    5. and then use this system to send bad messages to brakes or steering

    and all cars use different firmware with different security holes and different CPUs.
    But with enough research you could probably crack a specific vulnerable car model.

    Cracking modern airplanes seems easier, actually.

    • "all cars use different firmware with different security holes and different CPUs. But with enough research you could probably crack a specific vulnerable car model."

      Like a Mercedes C250 coup for example.

      http://www.occupy.com/article/exclusive-who-killed-michael-hastings [occupy.com]

      • by Mirar ( 264502 )

        Correct.

        Although there's lots of easier methods if you have access to the physical car.

        (Just like breaking a bluetooth lock is possible, but it's also possible to use a normal untraceable chainsaw on the wall next to the door.)

        (Also: Never attribute to malice that which is adequately explained by stupidity. I'm personally more worried about bugs in cars than security holes.)

        • by Anonymous Coward

          Never attribute to malice that which is adequately explained by stupidity.

          That is the dumbest saying ever. The opposite would be much better advice.

          • Re: potentially (Score:3, Insightful)

            by djdarko ( 3517817 )
            ... spoken like a true conspiracy theorist. A concept baked-in to Hanlon's Razor is the assumption that people generally try to do the best job that they can, within their abilities and constraints. This implies that most problems result from unintentional errors rather than malicious intent. Some people simply cannot accept the true level of complexity of the systems that humanity has created and their inherent fallibility. For those people, it is far more comforting to assume that it is all guided by
          • by Mirar ( 264502 )

            It might be in your world. I prefer not to assume the world is stupid, but not inherently malignant. I find it easier to live with.

            In some cases the stupidity leads to malignancy (NSA, TSA), even though it's well-intended.

        • I'm personally more worried about bugs in cars than security holes.

          And rodents, they can be pretty bad too.

    • On top of this why would anyone want to do this?

      If their goal is to try to kill you in a convoluted way they could just climb under your car with a set of pliers and cut through a couple of your brake lines.

      If their goal is to break into your car they can smash a window.

      If their goal is to steal your car they can do this with a flat bed truck, or just break into your house and steal the keys when you are asleep.

      There are endless ways people can cause havoc in our modern world. Fortunately a surprisingly lar

      • Who would want to do this? Security researchers. Why? Because press releases like these are how they get research funding to continue their work.

        Now, in a movie-theater mentality, I can think of reasons to do this beyond stealing a car. For example, if I can cause a 30 car pileup on a major highway, that'll draw attention and resources away from the financial district, making it easier for me to rob.

        In this case, it has the added benefit of being blind-broadcast. Unlike the Miller/Valasek attack, which is I

    • Most PCMs will take a standard OBD-II reset command without login, even while the vehicle is in motion. Use your own imagination as to what happens when the PCM reboots while the vehicle is in motion.

    • "Because infotainment systems processed DAB data to display text and pictures on car dashboard screens, he said, an attacker could send code that would let them take over the system.

      Once an infotainment system had been compromised, he said, an attacker could potentially use it as a way to control more critical systems, including steering and braking."

      Well, yeah.

      Normally it's not that easy. Sure, the car stereo sits on a can bus with nice information (ACC, backing signals to turn on the back camera, speed information so the volume can be automatically adjusted, etc). But it's not on the vital CAN bus (at least not on most cars).

      But yes, it's an entrance point. So is the 3g/wifi receiver in the stereo, or the bluetooth connection to the handsfree that it can do.

      But you would have to:

      1. crack an entrance point to the stereo (any of the above) 2. control the stereo CAN transmitter (if it has one) 3. using that CAN to crack an entrance point to another system that talks to a vital CAN bus 4. control that system enough to transmit CAN on the vital bus 5. and then use this system to send bad messages to brakes or steering

      and all cars use different firmware with different security holes and different CPUs. But with enough research you could probably crack a specific vulnerable car model.

      Cracking modern airplanes seems easier, actually.

      That settles it then, I am not going to root my Range Rover.

  • i did this back in 1988. but all i could figure out was how to make Ford vehicles drop out of speed control. no entertainment system was involved.
  • The UK's Society of Motor Manufacturers and Traders has responded by saying that car companies "invest billions of pounds to keep vehicles secure as possible"

    s/invest/waste/

    oh wait...

    s/possible/crap/

  • by Antique Geekmeister ( 740220 ) on Friday July 24, 2015 @07:37AM (#50173759)

    Car electronics are safe like work IT systems are safe. No one competent would design the systems with a shared set of credentials, with an easily cracked master control system, with low security systems granted bus access and with privileged commands going over the common bus without protection, because we "trust the people we work with".

    Unfortunately, this is rarely completely true in a large IT environment. There's often a set of vulnerabilities, which can be closed but require time and resources not allocated in the current quarter or even ever enabled. They're checked off on the security checklist, but the checklist is crafted to avoid the real problems, or personnel simply lie outright: this is at the core of many companies compliance with the FIPS guidelines. Those kinds of gaps help pay my salary: I often help close them and reduce the danger of them while they're being fixed.

    For car systems, there are various "buses" in use now. A casual search shows more than 10 distinct "vehicle bus" standards in use, and trying to secure and reliably use all of them consistently and safely _in terms of security_ is barely feasible, much less likely in the high urgency car market. The components also have to be extremely robust, low quiescent power, and not too expensive per unit, which adds other limitations and slows closing known security or newly discovered security holes.

    So I'm afraid that real security risks of the systems are to be expected. And they're quite unlikely to be fixed quickly when discovered, because it could involve replacing core components of the system and causing a _much_ higher rate of upgrade induced failures.

    • For car systems, there are various "buses" in use now. A casual search shows more than 10 distinct "vehicle bus" standards in use, and trying to secure and reliably use all of them consistently and safely _in terms of security_ is barely feasible, much less likely in the high urgency car market.

      At least four of those are OBD-II standards, and while they have different physical link layers, and have different low-level communications protocol, they all speak the same high-level protocol: OBD-II. OBD-II actually does have some notion of security, but it's not much of one, and most PCMs will take a reset command at any time — without a login command, and even if the vehicle is moving.

      There's no public key-based crypto on OBD-II either, so any module can spoof messages coming from any other modu

  • The summary here on /. reads

    "After taking control of the car's entertainment system it was possible to gain control of vital car systems such as the brakes"

    Actually reading the article you find nothing of the sort happened. The article merely states

    "Once an infotainment system had been compromised, he said, an attacker could potentially use it as a way to control more critical systems, including steering and braking."

    This hack consisted solely of causing text like "LOLZ I RULZ" appear on the radio display.

    T

  • {insert your favorite company here} Firewall for Cars!!! Followed by Cyberlock for Cars. Yes for only $300 (in bitcoin) you can drive your car again
  • Details or it's fake. Too many of these claims lately have nothing, not even a glimmer of details to prove they did anything, and all the demos are with a car that has been prepped for the demonstration.

    Even the Jeep one was a very scripted demo with a LOT of work done before hand to the vehicle. A lot of the ECM programming forums were calling shenanigans on the claims and the reporting was so bad that it is not clear that the car did not have something fitted to make it possible.

    These guys need to rele

  • that radio controlled vehicles were invented before cellphones, or even before the internet

  • http://whowhatwhy.org/2015/07/... [whowhatwhy.org]

    Our original report described anomalies of the crash and surrounding events that suggest cutting-edge foul playâ"that an external hacker could have taken control of Hastingsâ(TM)s car in order to kill him. If this sounds too futuristic, a series of recent technical revelations has proven that âoecar hackingâ is entirely possible. The latest just appeared this week.

  • about your ex-wife's car crash. "Sir, I assure you I was no where near my wife at the time of the crash. I was in a bar on 3rd street with friends."

  • I reeeeeeeally hope some jackass either bricks or low speed crashes or stalls out a massive amount of cars in the middle of rush hour so Congress can showboat in front of the media and do something about it. Right now most congressmen don't even know cars have computers.
  • Don't computerize the simple mechanical parts of a car. Just DON'T. You're collective playlists aren't worth the inevitable police and attacker control and surveillance of our cars.

    No, you and you, you can't outsmart them. You can't be God King of Koding and Do It Right. There is always a way, if you permit freaking Turning machines to control your vehicle, for someone to take control.

    A machine, a successful, elegant device that occupies the lowest possible fail state, is one that has as few moving parts as

  • when the radio station plays thrash metal, the cars all speed up; when it plays a ballad they all slow down. everybody knows that.

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...