One day soon, your new car will come loaded with apps that can play live baseball games from across the country or read news articles aloud. Buy a Toyota? Apple’s CarPlay will turn it into an iPhone on wheels. Opt for a Hyundai, and you’ll get Google’s Android operating system built into the dashboard. And most major automakers are planning to offer both.
That’s sure to stir up excitement among tech-savvy consumers, but it also has hackers imagining a whole new world of opportunity.
“Can some 14-year-old in Indonesia figure out how to [hack] this and just shut your car down “¦ because everything is now wired up?” asked Sen. Jay Rockefeller in a hearing last year.
That worry, while sounding rather dystopic, isn’t necessarily unrealistic, said Chris Valasek, who handles security intelligence for IOActive, a security firm. That’s because Valasek, while not a teenager from Southeast Asia, has taken car-hacking to a scary level.
Last year, Valasek and hacking partner Charlie Miller linked a laptop to the data port of a Ford Escape. Sitting in the backseat while a reporter drove, they changed the fuel indicator level, upped the speedometer reading to 199 mph and activated the horn. Then, mid-drive, they jerked the steering wheel back and forth and deactivated the vehicle’s brakes (an earlier test sent Miller into the back wall of his garage).
If that sounds frightening, Valasek says, it’s time to imagine the possibility that tomorrow’s hackers won’t need a plug-in cable — and they could do more than give their victims a little scare. “There’s a lot of wireless communications in the car, and I assume connected vehicles will add more wireless communications,” he said. “The more ways to wirelessly communicate with something, the more attack surface there is. Added complexity many times gives an attacker more ways to attempt to get into a vehicle.”
Attack surface is another way of describing the wireless entry points to a vehicle. Cars can use cellular networks to place calls or receive navigation. They use Wi-Fi to connect devices in the vehicle to the Internet. They link to phones with Bluetooth. Even their tires can send wireless signals to indicate low pressure.
Today’s cars have upward of 100 microprocessors to sort this data and send signals throughout the vehicle. The problem comes when one of these signals is breached. A computer, by contrast, has safeguards to protect systems like disk storage if another area, such as a Web browser, is hacked. This is known as preventing “lateral movement.”
“Cars aren’t really there yet,” Valasek said. “Many automobiles don’t have a layered approach to security right now. They just assume somebody can’t break in.”¦ You want to segregate portions.”
And while the internal workings of today’s cars lack protection, the software of tomorrow’s vehicles will add another challenge. With Android and CarPlay on the horizon — and most automakers on board — a whole generation of cars will soon hit the road en masse with virtually identical operating systems.
“The new operating systems will make the market less heterogeneous, which potentially is more dangerous,” said Vicente Diaz, a security researcher at Kaspersky Lab. “Attackers will be more familiar with these systems.”
Of course, hackers have already had years to practice breaking into those systems on mobile devices. “People have been hacking those operating systems for a long time,” Valasek said. “It may give them a more familiar method to get in.”
Another issue, Diaz warned, is that while phones tend to get replaced every few years, the longer lifespan of a car could make it increasingly vulnerable as time goes on.
Without further testing, it’s hard to say just what a cybercriminal could do with a given hack. No one knows how hard it would be to wirelessly replicate Valasek’s complete control of a car — or how many vehicles will suffer that vulnerability.
But other concerns could give car buyers pause. Hackers could steal a driver’s location data or use Bluetooth to activate a phone’s microphone and eavesdrop. Some remote unlock applications could even let hackers gain entry to a vehicle.
These violations won’t necessarily happen because a hacker targets a specific car. In most cases, hackers will gain access to a user’s online profile first, then wait for it to get linked to a vehicle. “[If] the app in your phone or your Web portal credentials get hacked, an attacker will have access to the data of your car,” Diaz said. “They could see all the details of your car, even its location, and in some cases be able to unlock the doors. All this may start with a simple phishing message, so consumers should be aware of what this new ecosystem represents and the consequences.”
Automakers say they take such threats seriously and are working to prevent them, though some point out that no one has successfully pulled off a real-world wireless hack. But that doesn’t mean it can’t or won’t happen, security experts warn. “Manufacturers need to really start considering what happens when someone does compromise a portion of their vehicle instead of assuming no one will,” Valasek said.
For now, he and his fellow “good-guy” hackers will keep making cars go haywire, warning of the threats they expose and hoping their finds help keep the road free of malicious hackers.
What We're Following See More »
President Trump this afternoon announced another round of sanctions on North Korea, calling the regime "a continuing threat." The executive order, which Trump relayed to Congress, bans any ship or plane that has visited North Korea from visiting the United States within 180 days. The order also authorizes sanctions on any financial institution doing business with North Korea, and permits the secretaries of State and the Treasury to sanction any person involved in trading with North Korea, operating a port there, or involved in a variety of industries there.
"Seated next to Ukrainian President Poroshenko on his final day of meetings at the United Nations, Trump did not say when he might go to Puerto Rico, but spoke solemnly about the destruction to an island he said had been 'absolutely obliterated.'”