{"id":5830,"date":"2014-08-27T10:00:58","date_gmt":"2014-08-27T14:00:58","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=5830"},"modified":"2019-11-15T07:13:43","modified_gmt":"2019-11-15T12:13:43","slug":"traffic-light-attacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/traffic-light-attacks\/5830\/","title":{"rendered":"Traffic Lights are Easy to Exploit"},"content":{"rendered":"<p>Have you ever wondered how easy your morning commute might be if all of the traffic lights went your way? Well, if you have a modicum of programming skill and an interest in cybercrime, you might just be able to turn that dream into reality.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Researchers: Attacking traffic light systems is surprisingly easy.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2rER&amp;text=Researchers%3A+Attacking+traffic+light+systems+is+surprisingly+easy.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Researchers at the University of Michigan have found that <a href=\"https:\/\/jhalderm.com\/pub\/papers\/traffic-woot14.pdf\" target=\"_blank\" rel=\"noopener nofollow\">systemic weaknesses in traffic control systems make them vulnerable to attack<\/a>. Those <a href=\"http:\/\/time.com\/3146147\/hacking-traffic-lights-is-apparently-really-easy\/\" target=\"_blank\" rel=\"noopener nofollow\">weaknesses include<\/a> the use of unencrypted wireless signals to control the lights, the use of default usernames and passwords on these control systems, and a vulnerable component known as a traffic controller, which is the device that controls the lights and walk signs.<\/p>\n<div class=\"pullquote\">Michigan researchers were able to crack the control system of traffic lights in an unnamed Michigan town using only a laptop computer with a wireless card operating at the same frequency as wirelessly connected lights.<\/div>\n<p>These systems are so vulnerable that the Michigan researchers <a href=\"http:\/\/www.vox.com\/xpress\/2014\/8\/20\/6048331\/traffic-light-laptop-hack\" target=\"_blank\" rel=\"noopener nofollow\">were able to crack the control system<\/a> of traffic lights in an unnamed Michigan town using only a laptop computer with a wireless card operating at the same frequency as wirelessly connected lights. Once in, the researchers used a series of simple commands to alter the timing patterns of traffic lights and manipulate lights with all reds and all greens along given routes (don\u2019t worry, the researchers reportedly had the permission of local authorities to do this). Researchers were unable to make all lights in a given intersection green \u2013 that, apparently, requires physical access to the roadside cabinets where failsafe switches are kept.<\/p>\n<p>While this news doesn\u2019t raise the same level of concern as attacks on critical infrastructure systems like the electrical grid \u2013 the main peril of potential <a href=\"http:\/\/money.cnn.com\/video\/technology\/2013\/09\/05\/t-cyber-warfare-hacking-infrastructure-syria.cnnmoney\/\" target=\"_blank\" rel=\"noopener nofollow\">cyberwarfare<\/a> \u2013 it would be nice to think that it would take a lot more than an overeager amateur hacker, like Seth Green\u2019s character from the 2003 movie \u201cThe Italian Job,\u201d to bring traffic to a screeching halt.<\/p>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/ybYQsVnh9QA?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span>\n<blockquote class=\"twitter-pullquote\"><p>Want all greens on the way to work? Try hacking into your local traffic light system.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2rER&amp;text=Want+all+greens+on+the+way+to+work%3F+Try+hacking+into+your+local+traffic+light+system.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>It would be nice to think that it would take a lot more than an overeager amateur hacker like Seth Green\u2019s character from the 2003 movie \u201cThe Italian Job,\u201d to bring traffic to a screeching halt.<\/p>\n","protected":false},"author":41,"featured_media":5831,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[282,801,82,803,802],"class_list":{"0":"post-5830","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-cyberwarfare","10":"tag-hacking","11":"tag-traffic-light-hack","12":"tag-traffic-lights"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/traffic-light-attacks\/5830\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/traffic-light-attacks\/3982\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/traffic-light-attacks\/3887\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/traffic-light-attacks\/4373\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/traffic-light-attacks\/4635\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/traffic-light-attacks\/5024\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/traffic-light-attacks\/4627\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/traffic-light-attacks\/5024\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/traffic-light-attacks\/5830\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/traffic-light-attacks\/5830\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5830"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5830\/revisions"}],"predecessor-version":[{"id":30741,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5830\/revisions\/30741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5831"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}