{"id":17831,"date":"2017-07-27T06:03:11","date_gmt":"2017-07-27T10:03:11","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=17831"},"modified":"2019-11-15T06:46:04","modified_gmt":"2019-11-15T11:46:04","slug":"hacking-a-carwash","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hacking-a-carwash\/17831\/","title":{"rendered":"Hacking a car wash?"},"content":{"rendered":"<p>Just when you think you\u2019ve heard it all when it comes to connected devices being hacked, Black Hat rolls around and makes you reconsider what you thought were the most bizarre things ever hacked.<\/p>\n<p>Thoughts may immediately jump to the latest and greatest connected IoT wearable or something odd like Google Glass \u2014 both good guesses \u2014 but they\u2019d be wrong. Chances are you would never guess, but we\u2019ll wait while you glance up again at the title of this post.<\/p>\n<p>You see, researchers Billy Rios and Jonathan Butts discovered that car washes could be hacked. OK \u2014 I know it does not sound all <em>that<\/em> exciting, but the researchers also noted that they had possibly discovered the first exploit that could cause physical harm to a person. [Ed. note: The <a href=\"https:\/\/usa.kaspersky.com\/blog\/jeep-hacked-again\/7502\/\" target=\"_blank\" rel=\"noopener\">Jeep hackers<\/a> might beg to differ.]<\/p>\n<p>The veteran researchers looked into the PDQ LaserWash after hearing about how a misconfigured machine hit a car with a mechanical arm and doused the occupants with water.<\/p>\n<p>Like many IoT devices and machines, car washes can be filed under \u201cThings you would never have thought needed to be online.\u201d And like many devices, the LaserWash had default passwords that the researchers said were easy to guess.<\/p>\n<p>Once inside the system, the researchers were able to find areas of manipulation including opening and closing bay doors, spraying water, and disabling the infrared sensors. Those may seem harmless, but the researchers also showed a video where they made the bay door crash on a car, which could do some serious damage to a vehicle or the people inside. If the hackers were feeling extra sassy, they could send an e-mail detailing the accident or posting it straight to Facebook.<\/p>\n<p>The e-mail function could be useful for the business owners and technicians for tracking issues and usage of the car wash; I still can\u2019t figure out why a car wash would need the ability to post to Facebook.<\/p>\n<p>The researchers also noted that although they disclosed the vulnerability to the manufacturer, there is no patch as of Black Hat 2017.<\/p>\n<p>The work done by Rios and Butts further highlights the need for everyone to change default passwords and think twice before connecting a device to the Internet. Although this was a test on a seemingly benign system, a car wash is a mini <a href=\"https:\/\/www.kaspersky.com\/blog\/ics-report-2017\/16967\/\" target=\"_blank\" rel=\"noopener nofollow\">industrial control system<\/a> that if used inappropriately could inflict some pain and suffering to innocent people.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"X0HM9Yk8T5\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/industrial-vulnerabilities\/12596\/\" target=\"_blank\" rel=\"noopener nofollow\">Hacking electricity, water, and food<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cHacking electricity, water, and food\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/industrial-vulnerabilities\/12596\/embed\/#?secret=jzGp3nEHqg#?secret=X0HM9Yk8T5\" data-secret=\"X0HM9Yk8T5\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>I hope this winds up being the weirdest thing we see hacked this week. But as they say, <em>What happens in Vegas\u2026<\/em> actually, forget that \u2014 we\u2019ll tell you about it on Kaspersky Daily and share it with you on Facebook.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just when you think you have seen everything hacked, Black Hat comes along and shows you that a car wash can be hacked.<\/p>\n","protected":false},"author":636,"featured_media":17832,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2684],"tags":[770,2587,542,1713,2585],"class_list":{"0":"post-17831","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"tag-black-hat","10":"tag-black-hat-2017","11":"tag-car-hacking","12":"tag-ics","13":"tag-pdq-laserwash"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacking-a-carwash\/17831\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hacking-a-carwash\/10891\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hacking-a-carwash\/12090\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hacking-a-carwash\/11385\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hacking-a-carwash\/11089\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hacking-a-carwash\/13988\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hacking-a-carwash\/14003\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hacking-a-carwash\/18099\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hacking-a-carwash\/9543\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hacking-a-carwash\/7141\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hacking-a-carwash\/14254\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/hacking-a-carwash\/8232\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hacking-a-carwash\/17448\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacking-a-carwash\/17642\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/black-hat\/","name":"black hat"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17831"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17831\/revisions"}],"predecessor-version":[{"id":29946,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17831\/revisions\/29946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17832"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}