Danish Authorities In Rush To Close Security Loophole In Chinese Electric Buses (theguardian.com) 43
An anonymous reader quotes a report from the Guardian: Authorities in Denmark are urgently studying how to close an apparent security loophole in hundreds of Chinese-made electric buses that enables them to be remotely deactivated. The investigation comes after transport authorities in Norway, where the Yutong buses are also in service, found that the Chinese supplier had remote access for software updates and diagnostics to the vehicles' control systems -- which could be exploited to affect buses while in transit.
Amid concerns over potential security risks, the Norwegian public transport authority Ruter decided to test two electric buses in an isolated environment. Bernt Reitan Jenssen, Ruter's chief executive, said: "The testing revealed risks that we are now taking measures against. National and local authorities have been informed and must assist with additional measures at a national level." Their investigations found that remote deactivation could be prevented by removing the buses' sim cards, but they decided against this because it would also disconnect the bus from other systems.
Ruter said it planned to bring in stricter security requirements for future procurements. Jenssen said it must act before the arrival of the next generation of buses, which could be even "more integrated and harder to secure." Movia, Denmark's largest public transport company, has 469 Chinese electric buses in operation -- 262 of which were manufactured by Yutong. Jeppe Gaard, Movia's chief operating officer, said he was made aware of the loophole last week. "This is not a Chinese bus problem," he said. "It is a problem for all types of vehicles and devices with Chinese electronics built in."
Amid concerns over potential security risks, the Norwegian public transport authority Ruter decided to test two electric buses in an isolated environment. Bernt Reitan Jenssen, Ruter's chief executive, said: "The testing revealed risks that we are now taking measures against. National and local authorities have been informed and must assist with additional measures at a national level." Their investigations found that remote deactivation could be prevented by removing the buses' sim cards, but they decided against this because it would also disconnect the bus from other systems.
Ruter said it planned to bring in stricter security requirements for future procurements. Jenssen said it must act before the arrival of the next generation of buses, which could be even "more integrated and harder to secure." Movia, Denmark's largest public transport company, has 469 Chinese electric buses in operation -- 262 of which were manufactured by Yutong. Jeppe Gaard, Movia's chief operating officer, said he was made aware of the loophole last week. "This is not a Chinese bus problem," he said. "It is a problem for all types of vehicles and devices with Chinese electronics built in."
Those shifty Chinamen. (Score:1)
Always trying to pull a fast one.
Re: (Score:1)
yeah im sure that TESLA doesn't have this feature, nor do f-35s or any other american vehicles sold abroad...
Re: (Score:1)
nor do f-35s or any other american vehicles
The F-35 doesn't need a kill switch. If the US decides you shouldn't be flying it they can order Lockheed to stop selling you what is needed to keep it flying. With the amount of maintenance required it will be grounded fairly quickly...
One way or another.
Re: (Score:2)
Access does at least appear to be encrypted (Score:5, Informative)
Samsik confirmed that it had been contacted by Movia and said that it was “not aware of any specific cases of deactivation of electric buses”.
(snip)
Yutong said it “strictly complies with the applicable laws, regulations, and industry standards of the locations where its vehicles operate” and that Yutong vehicle terminal data in the EU were stored at an Amazon Web Services (AWS) datacentre in Frankfurt.
A spokesperson added: “This data is used solely for vehicle-related maintenance, optimisation and improvement to meet customers’ after-sales service needs. The data is protected by storage encryption and access control measures. No one is allowed to access or view this data without customer authorisation. Yutong strictly complies with the EU’s data protection laws and regulations.”
The summary implies that remote deactivation is not that difficult, that does not appear to be the case.
I'm not really familiar with Tesla vehicles, do they have remote deactivation? Does any other car manufacturer have that?
Re: (Score:1)
Didn't Musk deactivate some Tesla cars in Russia?
Re: (Score:1)
https://www.cnn.com/2024/09/20... [cnn.com]
Re:Access does at least appear to be encrypted (Score:4, Interesting)
Clarification (Score:2)
Re: (Score:1)
Certainly a Tesla kill switch is feasible. I bet law enforcement would love that. Hell, a Tesla suicide-and-murder-by-car switch is feasible. I doubt such software has been written, but it's 100% doable. Musk has few to no morals.
Re: (Score:2)
Certainly a Tesla kill switch is feasible. I bet law enforcement would love that. Hell, a Tesla suicide-and-murder-by-car switch is feasible. I doubt such software has been written, but it's 100% doable. Musk has few to no morals.
not written eh?
https://electrek.co/2025/10/16... [electrek.co]
Re: (Score:2)
Hah! Good point. But that's just the more realistic driver mode for FSD, as opposed to sitting in the left lane at 60 like most Tesla drivers do.
The thing you have to realize about Teslas is that, despite having massively wonderful motors, excellent efficiency, and strong (though no longer leading) battery designs, they have utter shit for suspension. Thus, even with 500 HP, they are driven like grandma cars. Meanwhile, a grandma in a 200 HP BMW will drive twice as fast.
Re: (Score:2)
I'm not really familiar with Tesla vehicles, do they have remote deactivation?
Yes. It's a feature Tesla use quite actively during test drives. Tesla claims to never apply it to a purchased car once the title is transferred though.
Re: (Score:2)
The manufacturers of cars and car electronics have not admitted to such technology. Spyware and driver assistant, OnStar, have claimed such control over the manufacturer's hardware. Russian owners of Cyber-trucks have also made such claims against Tesla.
Re: (Score:2)
Does any other car manufacturer have that?
All or most GM vehicles have had that since ~2009. They used to advertise it on TV about how they'll stop the car if it's stolen.
see e.g. https://www.youtube.com/watch?... [youtube.com]
Tesla also offers some stuff like this. Ford claims not to... but not sure.
Re: Access does at least appear to be encrypted (Score:2)
Re: (Score:2)
Re: (Score:1)
Oh, good to know and thus stay away from Tesla cars. Until they implement a persistent kill switch (not for the car but for RF emissions), I'm not going to buy one.
Re: (Score:2)
Came to say, this is standard on many vehicles from other countries too. Tesla can remotely brick cars, disable DC charging capability, remove features that the owner paid for etc. Many vehicles have some kind of telemetry interface now, especially commercial ones where it's seen as a feature (for tracking, driver monitoring, anti-theft, maintenance).
There was a bit of a controversy when Hyundai introduced a "feature" via software update that allowed them to geofence or remotely disable vehicles.
The only di
Re: (Score:2)
I'd be much more concerned that if the buses are also tunneling back to the polity's network that there's now a vulnerable IoT device that allows using the method to do maintenance to then hop into another network.
This seems like something that doesn't need to be in a vendor cloud.
shutdown now (Score:5, Funny)
ssh [hostname]
shutdown now -h
(just wait until they learn there is a security flaw in most computers that allows them to be remotely deactivated as well)
Re: shutdown now (Score:1)
Yes. This is why .ssh/authorized_keys needs to be carefully managed as part of any security plan.
But I'm just a dumb bus driver. What do I know about the internets? Let the vendor figure it out.
Do the Danish have Smart Home kit ? (Score:1)
https://community.home-assistant.io/t/tuya-security-concerns-in-the-news/363597
It's a global problem (Score:2, Troll)
I think the backdoor isn't Chinese in the sense of the government or the country, it's more of a vendor problem globally. Vendors do this to keep control of what they sell, to be able to force customers to buy support subscriptions on pain of having the product stop working if they don't. Vendors from countries other than China do this just as often. We should be worried about what all vendors do, not just Chinese vendors.
Re: I have a dream (Score:2)
Your government has jurisdiction over what goes on in Redmond. Nominally.
Not so with Beijing or Hangzhou or wherever the fuck these busses are from.
This vulnerability is in most devices (Score:2)
If Danish actually cared about security they would control the cellular module and only allow it to connect to their servers. The fact they
Pop quiz, hotshot. There's a software bomb on a bu (Score:2)
Pop quiz, hotshot. There's a software bomb on a bus. Once the bus goes 50 miles an hour, the bomb is armed. If it drops below 50, it blows up. What do you do? What do you do?
Re:Pop quiz, hotshot. There's a software bomb on a (Score:2)
Call the media and enjoy the show at the evening news.
"This is not a Chinese bus problem," (Score:3)
If only a strange hybrid of John Deere and Tesla built buses, those would not have this problem, right?
Right?
I don't know why large buyers, in particular, allow end-to-end encrypted traffic between the vendor and the products the buyer ostensibly owns.
At the very least, the traffic should be open to inspection by the buyer, who should be able to selectively turn off or disable aspects of it.
Re: (Score:2)
Wouldn't EU privacy rules would require the encryption?
Re: (Score:2)
Yes, the problem with 'end-to-end encrypted traffic' is one end is the device, and the other end is the manufacturer. The supposed owner gets no look at the data 'his' device is sending
If (say) the bus services a naval base, very sensitive information may be transmitted (stop location, duration, schedule, internal fuel level...)
Jeep did this crap a few weeks back (Score:1)
So crying "China!" is once again misplaced.
Maybe (Score:2)
a default deny firewall for the win?
Not correct (Score:3)
Re: (Score:2)
Norway and Denmark need to be worried that the US will shut down and crash their buses in the event of a war with the US.
Re: Not correct (Score:2)