{"id":2392,"date":"2011-02-19T12:22:43","date_gmt":"2011-02-19T17:22:43","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=2392"},"modified":"2022-08-29T12:46:58","modified_gmt":"2022-08-29T16:46:58","slug":"hackers-can-target-cars","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/hackers-can-target-cars\/","title":{"rendered":"Hackers Can Target Cars"},"content":{"rendered":"<p><a href=\"https:\/\/kaylahawk.deviantart.com\/art\/Crazy-Car-Computers-166768861\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-104998\" title=\"Hackers Can Target Cars\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1-1.jpg?resize=167%2C110&#038;ssl=1\" alt=\"Hackers Can Target Cars\" width=\"167\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1-1.jpg?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1-1.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1-1.jpg?resize=768%2C507&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1-1.jpg?w=900&amp;ssl=1 900w\" sizes=\"auto, (max-width: 167px) 100vw, 167px\" \/><\/a><em><a href=\"http:\/\/www.wired.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wired<\/a><\/em> <a title=\"www.wired.com\" href=\"https:\/\/web.archive.org\/web\/20140315063142\/http:\/\/www.wired.com:80\/threatlevel\/2010\/03\/hacker-bricks-cars\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that over 100 drivers in <a title=\"Austin, Texas\" href=\"http:\/\/maps.google.com\/maps?ll=30.25,-97.75&amp;spn=0.1,0.1&amp;q=30.25,-97.75 (Austin%2C%20Texas)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">Austin, TX<\/a> found their <strong>cars disabled or the horns honking out of control. <\/strong>This happened\u00a0after an intruder ran amok in a <strong>web-based vehicle-immobilization system<\/strong> called Webtech Plus (<a href=\"http:\/\/www.payteck.cc\/Webteckplusad.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>). Webtech Plus is normally used to get the attention of consumers delinquent in their auto payments. The app is operated by <a title=\"Cleveland\" href=\"http:\/\/maps.google.com\/maps?ll=41.4822222222,-81.6697222222&amp;spn=0.1,0.1&amp;q=41.4822222222,-81.6697222222 (Cleveland)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">Cleveland<\/a>-based <a href=\"http:\/\/www.payteck.cc\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pay Technologies<\/a> system. It allows car dealers to install a black box in the vehicle that responds to commands issued through a central website and relayed over a wireless pager network.<\/p>\n<h3>How he got in<\/h3>\n<p>Austin police claim the perpetrator was Omar Ramos-Lopez, a former Texas Auto Center employee who was laid-off. The hacker allegedly sought <strong>revenge by bricking the cars<\/strong> sold from the Austin-area dealership. Reportedly Mr. Ramos-Lopez\u2019s account was closed when he was terminated but he allegedly got in through another employee\u2019s account. At first, the intruder targeted specific customers. The attacker later moved to access the database of all 1,100 customers whose cars were equipped with the device. It is charged that he went through the database, vandalizing the records, disabling the cars, and setting off the horns.<\/p>\n<h3>Cars are targets<\/h3>\n<p><a href=\"https:\/\/web.archive.org\/web\/20140330070650\/http:\/\/www.wired.com\/autopia\/2010\/05\/ford-american-journey\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105000 size-medium\" title=\"Texting Festiva\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FordUofMTweetingFiesta.jpg?resize=150%2C100&#038;ssl=1\" alt=\"\" width=\"150\" height=\"100\" \/><\/a>The Webtech attack was an external attack but Bob Brammer, CTO, and VP at Northrop Grumman Information Systems (<a href=\"https:\/\/www.tradingview.com\/chart\/?symbol=NYSE%3ANOC\" target=\"_blank\" rel=\"noopener noreferrer\">NOC<\/a>)\u00a0 told <a href=\"http:\/\/blogs.govinfosecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>GovInfo Security<\/em><\/a> that <strong>cars themselves are likely to become targets<\/strong>. Mr. Brammer points out that most cars contain <strong>50 to 100 or more tiny computers. The computers are controlled by over 100 megabytes of code that control the accelerator, brakes,<\/strong> displays, steering, etc. All of these systems can be accessed through a diagnostic port that serves as the vehicles&#8217; <a title=\"Universal Serial Bus\" href=\"http:\/\/en.wikipedia.org\/wiki\/Universal_Serial_Bus\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">USB port<\/a>. Mr. Brammer cites a study published in an <a href=\"http:\/\/www.ieee.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE<\/a> journal. &#8220;<em>It&#8217;s <strong>possible to take over a car<\/strong>, controlling the brakes, the accelerator, the steering wheel, despite whatever the driver might want to do. Our automobiles are highly vulnerable from a cybersecurity view.<\/em>&#8221;<\/p>\n<p>The paper,<em> Experimental Security Analysis of a Modern Automobile<\/em>, (<a href=\"http:\/\/www.autosec.org\/pubs\/cars-oakland2010.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>) says the potential attack window could widen as more automakers offer vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development, &#8220;<em>An attacker who is able to infiltrate almost any electronic control unit can leverage this ability to completely circumvent a broad array of safety-critical systems<\/em>.&#8221;\u00a0 <em><a href=\"http:\/\/gigaom.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">GigaOm<\/a><\/em> <a title=\"GigaOm\" href=\"https:\/\/web.archive.org\/web\/20210610090007\/https:\/\/gigaom.com\/2010\/11\/23\/cars-with-wi-fi-hitting-the-new-information-highway\/\" target=\"_blank\" rel=\"noopener noreferrer\">cites<\/a> data from <a href=\"https:\/\/web.archive.org\/web\/20140213043441\/http:\/\/www.isuppli.com:80\/Pages\/Home.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">iSuppli<\/a> that <a title=\"Wi-Fi\" href=\"http:\/\/en.wikipedia.org\/wiki\/Wi-Fi\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Wi-Fi<\/a> in automobiles will be integrated into <a href=\"https:\/\/web.archive.org\/web\/20130627111149\/http:\/\/www.isuppli.com\/Automotive-Infotainment-and-Telematics\/MarketWatch\/Pages\/Wi-Fi-in-the-Car-Past-and-Present.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">7.2 million cars by 2017<\/a>.<\/p>\n<p>The researchers said they <strong>took control of a number of the car&#8217;s functions<\/strong> and the driver could do nothing about it. They bypassed basic network security protections within the car. They then embedded malicious code in the telematics unit to erase evidence of the hack&#8217;s presence after a crash.<\/p>\n<h3>More theoretical than practical<\/h3>\n<p><a href=\"http:\/\/www.webmaster-success.com\/4-things-i-would-never-do-to-get-traffic-to-my-blog\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105002 size-medium\" title=\" I luv your PC\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-3.jpg?resize=150%2C99&#038;ssl=1\" alt=\" I luv your PC\" width=\"150\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-3.jpg?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-3.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-3.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Mr. Brammer, for now, sees the threat to cars as more theoretical than practical. But he says it demonstrates that we must think about cyber-security more broadly than we have in the past. &#8220;<em>As the trend is to put more IT into everything that we do &#8211; whether it&#8217;s cars, airplanes, power grids, water supplies, whatever &#8211; we have to think about the security aspects of the design. These systems, within reason, have to be able to withstand certain types of attempts to attack or exploit them. That&#8217;s a terrible thing have to say, but I think that&#8217;s the way world is these day<\/em>.&#8221;<\/p>\n<p><strong>Wi-Fi can give attackers an entry point into critical systems<\/strong>. Professor <a href=\"http:\/\/cseweb.ucsd.edu\/~savage\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stefan Savage<\/a> of the <a href=\"http:\/\/www.ucsd.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">University of California, San Diego<\/a> <a title=\"Technology Review\" href=\"https:\/\/web.archive.org\/web\/20120422232255\/http:\/\/www.technologyreview.com:80\/computing\/26045\/?a=f\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a href=\"http:\/\/www.technologyreview.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Technology Review<\/em><\/a>. &#8220;<em>In a lot of car architectures, all the computers are interconnected, so that having taken over one component, there&#8217;s a substantive risk that you could take over all the rest of them. Once you&#8217;re in, you&#8217;re in<\/em>.&#8221; This could lead to brakes failing or the steering wheel seizing on scores if not hundreds of cars simultaneously, causing catastrophic crashes.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Cars have become more computerized. They are linked through Wi-Fi and 3G networks making our daily transportation vulnerable to hackers and cyber-attacks. Cyber-terrorists could target cars to begin the chain of events leading to a Hollywood-style disaster. Hopefully, the Auto manufacturers are going to tighten up the security of our cars. They will delay improving security if safety belts and airbags are examples.<\/em><\/p>\n<p><strong>Will the auto industry tighten the security onboard cars?<\/strong><\/p>\n<p><strong>Will the government have to step in?<br \/>\n<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cars have 100+ computers to control the accelerator brakes display and will become hacker targets because they can bypass safety systems and cause a crash<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[3045,2743,494,605,1035,493,76,687,2744,25],"class_list":["post-2392","post","type-post","status-publish","format-standard","hentry","category-cars","tag-3045","tag-austin","tag-automobile","tag-cyberwarfare","tag-f","tag-ford-motor-company","tag-ieee","tag-network-security","tag-texas","tag-wireless"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=2392"}],"version-history":[{"count":18,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2392\/revisions"}],"predecessor-version":[{"id":132650,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2392\/revisions\/132650"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=2392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=2392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=2392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}