Car hacking
   HOME

TheInfoList



OR:

Automotive hacking is the exploitation of vulnerabilities within the software, hardware, and communication systems of
automobile A car or automobile is a motor vehicle with wheels. Most definitions of ''cars'' say that they run primarily on roads, seat one to eight people, have four wheels, and mainly transport people instead of goods. The year 1886 is regarde ...
s.


Overview

Modern automobiles contain hundreds of on-board computers processing everything from vehicle controls to the infotainment system. These computers, called
Electronic control unit An electronic control unit (ECU), also known as an electronic control module (ECM), is an embedded system in automotive electronics that controls one or more of the electrical systems or subsystems in a car or other motor vehicle. Modern vehic ...
s (ECU), communicate with each other through multiple networks and communication protocols including the
Controller Area Network A Controller Area Network (CAN bus) is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each other's applications without a host computer. It is a message-based protocol, designed originally for mu ...
(CAN) for vehicle component communication such as connections between engine and brake control;
Local Interconnect Network LIN (Local Interconnect Network) is a serial network protocol used for communication between components in vehicles. It is a single wire, serial network protocol that supports communications up to 19.2 Kbit/s at a bus length of 40 meters. The need ...
(LIN) for cheaper vehicle component communication such as between door locks and interior lights;
Media Oriented Systems Transport MOST (Media Oriented Systems Transport) is a high-speed multimedia network technology optimized by the automotive industry. It can be used for applications inside or outside the car. The serial MOST bus uses a daisy-chain topology or ring topolo ...
(MOST) for infotainment systems such as modern touchscreen and
telematics Telematics is an interdisciplinary field encompassing telecommunications, vehicular technologies (road transport, road safety, etc.), electrical engineering (sensors, instrumentation, wireless communications, etc.), and computer science (multimedia ...
connections; and FlexRay for high-speed vehicle component communications such as active suspension and active cruise control data synchronization. Additional consumer communication systems are also integrated into automobile architectures including
Bluetooth Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limi ...
for
wireless device Wireless communication (or just wireless, when the context allows) is the transfer of information between two or more points without the use of an electrical conductor, optical fiber or other continuous guided medium for the transfer. The most ...
connections, 4G Internet hotspots, and vehicle
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wav ...
. The integration of these various communications and software systems leaves automobiles vulnerable to attack. Security researchers have begun demonstrating the multitude of potential attack vectors in modern vehicles, and some real-world exploits have resulted in manufacturers issuing vehicle recalls and software updates to mobile applications. Manufacturers, such as John Deere, have used computer systems and Digital Rights Management to prevent repairs by the vehicle owners, or by third parties, or the use of aftermarket parts. Such limitations have prompted efforts to circumvent these systems, and increased interest in measures such as
Motor Vehicle Owners' Right to Repair Act The Motor Vehicle Owners' Right to Repair Act, sometimes also referred to as Right to Repair, is a name for several related proposed bills in the United States Congress and several state legislatures which would require automobile manufacturers to ...
.


Research

In 2010, security researchers demonstrated how they could create physical effects and undermine system controls by hacking the ECU. The researchers needed physical access to the ECU and were able to gain full control over any safety or automotive system including disabling the brakes and stopping the engine. In a follow-up research paper published in 2011, researchers demonstrated that physical access is not even necessary. The researchers showed that “remote exploitation is feasible via...mechanics tools, CD players, Bluetooth, cellular radio...and wireless communication channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft”. This means that a hacker could gain access to a vehicle's vital control systems through almost anything that interfaces with the automobile's systems.


Recent exploits


2015 Fiat Chrysler UConnect Hack

UConnect is Fiat Chrysler's Internet-connected feature which enables owners the ability to control the vehicle's infotainment/navigation system, sync media, and make phone calls. It even integrates with the optional on-board WiFi. However, susceptibilities in Fiat Chrysler’s UConnect system, available on over 1.4 million cars, allows hackers to scan for cars with the system, connect and embed malicious code, and ultimately, commandeer vital vehicle controls like steering and brakes.


2015 Tesla Model S Hack

In 2015 at the DEF CON hacking conference Marc Rogers and Kevin Mahaffey demonstrated how a chain of exploits could be used to take complete control of the Model S. Marc Rogers and Kevin Mahaffey identified several remote and local vulnerabilities that could be used as entry points. They demonstrated that after exploitation the vehicle could be remotely controlled with an iPhone. Finally, they also demonstrated that it was possible to install a
backdoor A back door is a door in the rear of a building. Back door may also refer to: Arts and media * Back Door (jazz trio), a British group * Porta dos Fundos (literally “Back Door” in Portuguese) Brazilian comedy YouTube channel. * Works so titl ...
that allowed persistent access and control of the vehicle in a similar fashion to
exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: *Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploitat ...
techniques more usually associated with traditional computer systems. Marc Rogers and Kevin Mahaffey worked with
Tesla, Inc. Tesla, Inc. ( or ) is an American multinational automotive and clean energy company headquartered in Austin, Texas. Tesla designs and manufactures electric vehicles (electric cars and trucks), battery energy storage from home to grid- ...
to resolve the issues before disclosure. It was announced before the presentation that the entire global fleet of Model S cars had been patched overnight, the first proactive mass Over The Air (OTA) security update of vulnerable vehicles.


General Motors OnStar RemoteLink App

The
OnStar OnStar Corporation is a subsidiary of General Motors that provides subscription-based communications, in-vehicle security, emergency services, turn-by-turn navigation, and remote diagnostics systems throughout the United States, Canada, China, ...
RemoteLink app allows users the ability to utilize OnStar capabilities from their Android or
iOS iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also include ...
smartphones. The RemoteLink app can locate, lock and unlock, and even start your vehicle. The flaw in General Motors’ OnStar RemoteLink app, while not as extreme as UConnect, allows hackers to impersonate the victim in the eyes of the RemoteLink app. This means that the hackers can access all of the features of the RemoteLink app available to the victim including locating, locking and unlocking, and starting the engine.


Keyless entry

The security researcher
Samy Kamkar Samy may refer to: *Samy (director) (active from 2006), Tamil film director *Samy (XSS), a computer worm *Samy (Mobile Marketing) ''MobileBits Corporation'' is an American marketing technology/advertising company that operated a pure brand mobil ...
has demonstrated a device that intercepts signals from keyless-entry fobs and would allow an attacker to unlock doors and start a car's engine.


"USB" entry

Kia back windows can be broken without setting off an alarm, and Hyundai are similar. Since 2021, on social media, videos show stealing of post-2010 Kia vehicles and post-2014 Hyundai vehicles, without engine immobilizers, with a USB 1.1 A plug
cable Cable may refer to: Mechanical * Nautical cable, an assembly of three or more ropes woven against the weave of the ropes, rendering it virtually waterproof * Wire rope, a type of rope that consists of several strands of metal wire laid into a hel ...
, or pliers. Kia started installing immobilizers in 2022.


References

{{Reflist Hacking (computer security) Terrorism by method