{"id":2814,"date":"2014-11-06T17:47:33","date_gmt":"2014-11-06T17:47:33","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2814"},"modified":"2020-02-26T10:57:14","modified_gmt":"2020-02-26T15:57:14","slug":"hacking-my-car-not-a-reality-yet-but-its-coming","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hacking-my-car-not-a-reality-yet-but-its-coming\/2814\/","title":{"rendered":"Hacking my car: not a reality yet, but it&#8217;s coming"},"content":{"rendered":"<p>What does it take to hack a car? Modern cars are filled with various kinds of electronics, which are -quite naturally \u2013 controlled by a central hub. In other words, an automotive on-board computer. And guess what? It can be hacked!<\/p>\n<p style=\"text-align: center\">\n<\/p><p>Last year, Charlie Miller and Chris Valasek <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/07\/24\/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video\/\" target=\"_blank\" rel=\"noopener nofollow\">showed the Forbes\u2019 editor how to disable the Ford Escape\u2019s brakes<\/a> by using a laptop connected to the car\u2019s dashboard. Miller and Valasek managed to reverse-engineer enough of the software of the Escape and the Toyota Prius, and found several ways a hacker could play a variety of dirty tricks: from annoyances like continuously blasting the horn, to serious hazards like slamming on the Prius\u2019 brakes at high speeds. They sent commands from their laptops that killed power steering, spoofed the GPS, and made pathological liars out of speedometers and odometers. The only \u201csetback\u201d there was this required direct access to the onboard system for the hack to take place.<\/p>\n<p>Earlier this year, Valasek and Miller presented their <a href=\"http:\/\/illmatics.com\/car_hacking.pdf\" target=\"_blank\" rel=\"noopener nofollow\">industry-wide study<\/a> of remote hacking possibilities (which are, thankfully, not actual hacks \u2013 yet) for smart cars at Black Hat USA.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>What does it take to hack a car? #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F34nP&amp;text=+What+does+it+take+to+hack+a+car%3F+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>What they have found is both encouraging and a bit alarming. The good news: It won\u2019t be that easy to hack a smart car \u2013 so no car-based botnets any time soon. And remote grand theft auto is also in the distant future. Hacking a car, according to Valasek, is hard, it\u2019s expensive, and it\u2019s time consuming.<\/p>\n<p>The bad news is it is ultimately still possible, and, according to Valasek, a car attack \u201cwould be very targeted\u201d. Which means that special-purpose vehicle producers and their potential clients \u2013 dignitaries, military personnel \u2013 should pay attention to this study. Most likely, they\u2019d be among the first at risk.<\/p>\n<p>The topic of car hacking actually gets re-ignited on a regular basis. Javier Vazquez-Vidal and Alberto Garcia Illera <a href=\"http:\/\/money.cnn.com\/2014\/06\/01\/technology\/security\/car-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">demonstrated<\/a> vehicle control using a $20 device at Black Hat Asia 2014. There were discussions of how \u201cold and dumb\u201d the car computers were, \u201cbuilt safely enough back in the 1990s, when the car was a closed box\u201d.<\/p>\n<p>In August, Wired <a href=\"http:\/\/www.wired.com\/2014\/08\/wireless-car-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">ran an article<\/a> about a security researcher who found a way to \u201cspoof the signal from a wireless key fob and unlock a car with no physical trace, using a code breaking attack that takes as little as a few minutes to perform\u201d.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020159\/wide-2-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2816\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020159\/wide-2-1.png\" alt=\"wide-2\" width=\"1000\" height=\"667\"><\/a><\/p>\n<p>Then, last month, the security firm Coalfire <a href=\"http:\/\/www.coalfire.com\/The-Coalfire-Blog\/October-2014\/Dude-where-is-my-car\" target=\"_blank\" rel=\"noopener nofollow\">started publishing the findings of their research<\/a> and penetration tests aimed at the car systems, going as far as to show how a built-in smartphone connectivity to the automotive system can be exploited \u2013 essentially it boils down to a compromised vCard in the phone and an SQL injection attack.<\/p>\n<p><em>\u201cSuccessful exploitation often grants unfettered access to the infotainment system, which is essentially just a QNX operating system. A foothold like this can then be used to exploit a variety of other subsystems including the CAN bus, further exposing the vehicle and those inside to risk. The research is out there, we need only to tie it together\u201d,<\/em> \u2013 researchers said.<\/p>\n<p>They have also stated that by exploiting \u201cvulnerabilities discovered in hidden and undocumented interfaces,\u201d they were able \u201cto harness GPS functions to locate cars, lock and unlock vehicles, and perform other malicious tasks\u201d.<\/p>\n<p>Linked above is just the first part of their research, but it\u2019s definitely worth reading the entire report.<\/p>\n<p>Hacking a car, in theory, may lead to dire consequences \u2013 it\u2019s just too easy to imagine what real bad guys can do with a car they have hijacked remotely.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Hacking my car: not a reality yet, but it\u2019s coming #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F34nP&amp;text=+Hacking+my+car%3A+not+a+reality+yet%2C+but+it%26%238217%3Bs+coming+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>But remote access has several requirements: the car system should have an entry point with a \u201cwelcome, hackers\u201d sign on it, this entry point should be connected to essential systems such as brakes, steering, or airbags. Miller and Valasek note in their research that in certain models of smart cars, so-called \u201cviable attack points\u201d \u2013 Bluetooth, telematics, radio \u2013 are isolated from the safety critical components, so that they even work on different computer networks. That\u2019s apparently the safest possible architectural approach given cars are no longer the \u201cclosed boxes\u201d they used to be.<\/p>\n<p>Valasek and Miller\u2019s research paper suggests that not all carmakers are equally cautious about the security of the networked components, but then again, so far the researcher\u2019s work is theoretical. They acknowledge they have yet to attempt some actual remote hacks.<\/p>\n<p>And while CNN makes some <a href=\"http:\/\/money.cnn.com\/2014\/06\/01\/technology\/security\/car-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">startling statements<\/a> such as <em>\u201cThe next generation of Audi and Tesla automobiles are connected to the AT&amp;T network. Wires won\u2019t be needed to hack them<\/em>\u201c, it is still a question of how viable the remote attack possibilities are.<\/p>\n<p>But from the security point of view it is reasonable to assume that the cars are as eligible to be cybercriminal\u2019s targets as any other critical systems, such as ICS. The situation is similar: a connectivity is being added to legacy equipment, putting it at risk for something that hadn\u2019t been taken into account when this equipment was designed. To make things right, <a href=\"https:\/\/business.kaspersky.com\/businesses-should-strive-to-be-cyber-resilient\/2587\" target=\"_blank\" rel=\"noopener nofollow\">the equipment must be replaced<\/a> with items that have security in mind from the ground up.<\/p>\n<p>It\u2019s the same with cars. Connectivity is great for users. It\u2019s really convenient to command your car to block the brakes remotely; one day we will be able to command cars to park themselves. Google is actively working on a self-driving car, operated by AI.<\/p>\n<p>Imagining AI getting remotely hacked feels like a re-enactment of the events in the 1977 thriller \u201cThe Car;\u201d it\u2019s a bit scary. Only the correct approach to automotive systems\u2019 security can prevent scenarios of this kind from becoming a reality.<\/p>\n<p>This \u201ccorrect approach\u201d includes possible \u201cattack points\u201d being brick-walled from any safety-critical components, a high-grade quality assurance and the possibility to update software in case of new flaw discoveries, among other things. It\u2019s most important that the car on-board systems are designed with security in mind from day one.<\/p>\n<p>Just like it should be with any system of critical importance. Our lives depend on it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Car hacking is a topic that resurfaces regularly. Still, a remote takeover of a car&#8217;s system is not a reality &#8211; yet. It may become a reality without the proper approach to the security of a car&#8217;s on-board systems.<\/p>\n","protected":false},"author":209,"featured_media":15778,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2217,542],"class_list":{"0":"post-2814","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-automobile-computers","10":"tag-car-hacking"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacking-my-car-not-a-reality-yet-but-its-coming\/2814\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacking-my-car-not-a-reality-yet-but-its-coming\/2814\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hacking-my-car-not-a-reality-yet-but-its-coming\/2814\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/automobile-computers\/","name":"automobile computers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2814"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2814\/revisions"}],"predecessor-version":[{"id":33372,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2814\/revisions\/33372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15778"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}