Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Security

Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years 37

Many trains in the U.S. are vulnerable to a hack that can remotely lock a train's brakes, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the researcher who discovered the vulnerability. From a report:The railroad industry has known about the vulnerability for more than a decade but only recently began to fix it. Independent researcher Neil Smith first discovered the vulnerability, which can be exploited over radio frequencies, in 2012.

"All of the knowledge to generate the exploit already exists on the internet. AI could even build it for you," Smith told 404 Media. "The physical aspect really only means that you could not exploit this over the internet from another country, you would need to be some physical distance from the train [so] that your signal is still received."

Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years

Comments Filter:
  • From the industry that brought about the East Palestine derailment due to issues being ignored.

    • by Anonymous Coward

      .... the vulnerability, which can be exploited over radio frequencies

      What the fucking fuck?? Why is it even possible for a train to receive radio signals that can do something with the brakes? That makes no sense.

      • Excellent question but the story is paywalled.

        https://archive.ph/6fp8m [archive.ph]

        Because of FSK encoded radio links designed in the 1980s.

        • by Anonymous Coward

          Excellent question but the story is paywalled.

          https://archive.ph/6fp8m [archive.ph]

          Because of FSK encoded radio links designed in the 1980s.

          Unfortunately, even if you read the paywalled article, it is very vague and doesn't actually explain anything. It only says this:

          A lack of good communication between the front of the train and the back of a train caused accidents. In the 1980s, following a Congressional mandate, the rail industry instituted what it called an “End-of-Train and Head-of-Train Remote Linking Protocol.” This system allowed the back of the train to send telemetry data to the front and for the front to send basic commands back over radio frequencies.

          • It sounds like 80s era wireless trail braking used on trucks hauling trailers. You want all the units braking in unison.
            • Trains use an air brake system with glad hand connections so that if a coupler fails (or more likely, wasn't correctly secured) the pressure is released and the brakes set on the entire train. The device we're talking about, which is known as FRED (on railroads the F is considered to be an F-Bomb) replaced the caboose in the 1980s. It monitors brake system pressure to ensure that it is in the operating range, and can also release the system pressure from the rear. This is needed so that the train brakes mor

        • Here's a non-paywalled article:

          Hackers can tamper with train brakes using just a radio [gizmodo.com]

          The obvious reason is to remotely stop a runaway train.

          The stupid part is that there is no authentication or encryption.

          Another option would be to use a deadman switch, which the engineer has to periodically reset to keep the brakes open. Most trains have some kinda deadman switch.

          • by b0s0z0ku ( 752509 ) on Tuesday July 15, 2025 @05:47PM (#65523408)

            It's not necessarily stupid that there's no authentication. This fails safe (train stops), not deadly ... you actually want emergency services to be able to stop any runaway train without begging for a code to do so.

            Trains already have a dead-man switch, generally in the form of a Big Red Button that has to be pressed within a certain time after a buzzer sounds (called an alerter).

            The way that train brakes are applied is interesting - they respond to a DROP of air pressure in the brake pipe that goes from wagon to wagon. This is a fail-safe to force the brakes to apply if the line develops a leak. But what if the line has a clog or closed valve somewhere in the train? The dead-man switch in the locomotive would only cause the brakes IN FRONT OF the clog to apply - the radio system works from the rear of the train, so will apply the brakes BEHIND the clog. In an extreme situation, both the dead-man switch and the radio system can be useful.

            • Unfortunately it *is* stupid that there's no authentication. Something as simple as even a 4-digit PIN check would have been sufficient. There is no need to allow random radio transmitters to apply the brakes, and anyone with the *authorized* equipment would be able to have an emergency override code possibly built right into their gear.

              The system, as designed, has *no* such codes at all.

              • If you implemented it entirely as dead-man switch logic, the signal could just be jammed, causing the dead-man timers to time out. Jamming does not require breaking the authentication scheme.

          • The protocol was designed in the 1980s. What encryption were you going to run on Z80 class processors?

      • How many humans do you think are aboard a freight train?

        For safety reasons, most standard US freight trains are legally required to have a minimum of two human crew members, including a locomotive engineer and a conductor. However, there are exceptions for certain one-person train crew operations that do not pose significant safety risks, according to the Federal Railroad Administration (FRA).

        And for the record: The train companies aren't happy about that. They'd rather have ONE person...

        Key Takea [aar.org]

      • The response to the radio signal is to fail safe (stop), not fail deadly. You definitely want emergency services to be able to stop a runaway train (esp on without a driver) without much bureaucracy. The risk is a stopped train. The risk of NOT having that ability is a disaster like the Lac-Mégantic incident ~10 years ago.
  • A foreign actor / interest could send the gear to the states to an employment firm... And simply ask them to interview people by sending them to a location with the device and activating the device at a specific time... Not good. User could be totally unaware of the actions being taken by the device. This could lead to easy entrapment across a number of scenarios.
    • Or you could hire someone to do it on Fiverr or TaskRabbit.

      They'll do the task they were paid to do so that they can get a five-star review.

      Ukraine did something similar for the 2025-06-01 drone raid on Russian airfields. The truck drivers who delivered the drones had no idea what cargo they were carrying or why. They were just told where to go and where to park when they got there.

  • by 93 Escort Wagon ( 326346 ) on Tuesday July 15, 2025 @03:26PM (#65523052)

    It's a subscriber-only 404 Media blog post.

    Too bad... I was curious to learn how "AI" could build something that would generate RF radio waves near railroad tracks. Is there nothing AI can't do?

    • It's a subscriber-only 404 Media blog post.

      So, so many of these lately, for the past year or two.

      One may be inclined to think these are only Slashvertisements.

      Is 404 also owned by Beez-Ex? (sic., to evade the lameness filter on that name)

  • CISA has told The Register the train issue may not as bad as it sounds, and confirmed work is underway to get a replacement system deployed.

    "[This] vulnerability has been understood and monitored by rail sector stakeholders for over a decade, CISA acting executive assistant director for cybersecurity Chris Butera told us in an email. "To exploit this issue, a threat actor would require physical access to rail lines, deep protocol knowledge, and specialized equipment, which limits the feasibility of widespre

    • It is as bad as it sounds. If you triggered it at the right time you could cause a derailment as the brakes applied full across the entire train. This is only likely if the train is moving at relatively high speed on bad track, though.

  • by Casandro ( 751346 ) on Tuesday July 15, 2025 @04:05PM (#65523170)

    In railway safety is usually very important, and a stopped train usually is in its safest state. So everything typically fails towards stopping a train.

    You can stop many stations by placing a copper wire on the tracks at a strategic position, making all of the systems believe that there is a train. You can puncture a brake line and the train will stop. You can cut wires used for signaling and the signals will fall back to stop... on AFAIK any signaling system.

    • You can puncture a brake line

      Presumably not on these trains since if they were using air brakes there would be no need for a radio interface.

      • They use air brakes operated by releasing the air from the lok end (front). The devices in question dump air from the back end of the train in an emergency (e.g. if there's a clog in the line and the rear wagons don't release pressure).
  • by PPH ( 736903 ) on Tuesday July 15, 2025 @04:10PM (#65523176)

    People have been able to do that since Snidely Whiplash tied Nell Fenwick to the railroad tracks.

  • I watched the DEF CON 26 talk [youtube.com] on this. Basically, some dipshit designed a wireless system that is completely insecure and can be fooled into braking the train and possibly individual cars. It's like a LOT of industrial equipment that does this.

    I remember during a hurricane years ago there was a run on gas. I was able to connect to gas stations all over the place (found by shodan.io) that had some kind of monitors on their underground tanks that showed what kind of fuel it was, how much, water contamination,

    • by malkavian ( 9512 )

      These days, it's a few hundred to get the equipment to interact with this system. When it was invented, computer security was barely even thought about, and the equipment to exploit it would have been extremely expensive (if you could even get it outside industry).

  • Fortunately, the US has no enemies and nobody would ever think to use this for anything bad. Right?

  • "The physical aspect really only means that you could not exploit this over the internet from another country, you would need to be some physical distance from the train [so] that your signal is still received."

    If it is a passive signal, it seems like the only thing preventing that is a lack of transmit power, at least to within the limits of the curvature of the earth (or, depending on frequency, maybe not even beyond that limit). And it's hard to overestimate the potential for financial loss if someone remotely cracked into a SpaceX satellite and manipulated its SDR to send such a signal from space.

    Even if the attack requires two-way communication, the attacker still wouldn't need to be close to the train; the

    • Nothing prevents someone from maliciously dangling a battery-powered or solar-powered, cellular-capable pod off the edge of a highway bridge that crosses a railroad track and being half a continent away when actually triggering it.

      Except that as the train passes under bridge, it will momentarily interrupt the brake signal, yes, but as the train slows down it will go away from the transmitter and likely get far enough away to restore the signal and the train brake signal will be restored, so the train keeps going...

      (Train brakes aren't like throwing an anchor from a ship, they take time to stop the train.)

      Yes, you could attach the transmitter to the train, but, really, what's the point?

  • by b0s0z0ku ( 752509 ) on Tuesday July 15, 2025 @05:39PM (#65523396)
    This was an issue in Poland a couple of years ago with a similar system called "RadioStop." I think it was even exploited by Russian hackers.
  • ....and have been able to for a while. :|

  • Contrive a transmitter such that it jams the radio signal that tells the train engineer the brakes are working properly, so the train reacts by hitting the brakes. Of course, you have to be traveling close enough to the train so your transmitter can overwhelm the safety equipment...

    Seems simple enough.

    If you want to stop a train, wouldn't it be easier to steal a car and park it on the RR track so the train hits it. If don't want to hurt anyone, put it at the end of a long straightaway, with the lights on so

  • US Positive Train Control (PTC) systems puts the life-safety-critical functions into a computer on-board the locomotive, parallel to the train engineer/operator. PTC needs, just the the meat-bag engineer, to know what's going on in front of the train (what the signals are set to, whether the track ahead is occupied by another train, etc.). While a lot of the more static information is canned into the PTC computer and updated occasionally, real-time stuff are information messages transmitted by radio every 6

The bogosity meter just pegged.

Working...