One day soon, your new car will come loaded with apps that can play live baseball games from across the country or read news articles aloud. Buy a Toyota? Apple’s CarPlay will turn it into an iPhone on wheels. Opt for a Hyundai, and you’ll get Google’s Android operating system built into the dashboard. And most major automakers are planning to offer both.
That’s sure to stir up excitement among tech-savvy consumers, but it also has hackers imagining a whole new world of opportunity.
“Can some 14-year-old in Indonesia figure out how to [hack] this and just shut your car down “¦ because everything is now wired up?” asked Sen. Jay Rockefeller in a hearing last year.
That worry, while sounding rather dystopic, isn’t necessarily unrealistic, said Chris Valasek, who handles security intelligence for IOActive, a security firm. That’s because Valasek, while not a teenager from Southeast Asia, has taken car-hacking to a scary level.
Last year, Valasek and hacking partner Charlie Miller linked a laptop to the data port of a Ford Escape. Sitting in the backseat while a reporter drove, they changed the fuel indicator level, upped the speedometer reading to 199 mph and activated the horn. Then, mid-drive, they jerked the steering wheel back and forth and deactivated the vehicle’s brakes (an earlier test sent Miller into the back wall of his garage).
If that sounds frightening, Valasek says, it’s time to imagine the possibility that tomorrow’s hackers won’t need a plug-in cable — and they could do more than give their victims a little scare. “There’s a lot of wireless communications in the car, and I assume connected vehicles will add more wireless communications,” he said. “The more ways to wirelessly communicate with something, the more attack surface there is. Added complexity many times gives an attacker more ways to attempt to get into a vehicle.”
Attack surface is another way of describing the wireless entry points to a vehicle. Cars can use cellular networks to place calls or receive navigation. They use Wi-Fi to connect devices in the vehicle to the Internet. They link to phones with Bluetooth. Even their tires can send wireless signals to indicate low pressure.
Today’s cars have upward of 100 microprocessors to sort this data and send signals throughout the vehicle. The problem comes when one of these signals is breached. A computer, by contrast, has safeguards to protect systems like disk storage if another area, such as a Web browser, is hacked. This is known as preventing “lateral movement.”
“Cars aren’t really there yet,” Valasek said. “Many automobiles don’t have a layered approach to security right now. They just assume somebody can’t break in.”¦ You want to segregate portions.”
And while the internal workings of today’s cars lack protection, the software of tomorrow’s vehicles will add another challenge. With Android and CarPlay on the horizon — and most automakers on board — a whole generation of cars will soon hit the road en masse with virtually identical operating systems.
“The new operating systems will make the market less heterogeneous, which potentially is more dangerous,” said Vicente Diaz, a security researcher at Kaspersky Lab. “Attackers will be more familiar with these systems.”
Of course, hackers have already had years to practice breaking into those systems on mobile devices. “People have been hacking those operating systems for a long time,” Valasek said. “It may give them a more familiar method to get in.”
Another issue, Diaz warned, is that while phones tend to get replaced every few years, the longer lifespan of a car could make it increasingly vulnerable as time goes on.
Without further testing, it’s hard to say just what a cybercriminal could do with a given hack. No one knows how hard it would be to wirelessly replicate Valasek’s complete control of a car — or how many vehicles will suffer that vulnerability.
But other concerns could give car buyers pause. Hackers could steal a driver’s location data or use Bluetooth to activate a phone’s microphone and eavesdrop. Some remote unlock applications could even let hackers gain entry to a vehicle.
These violations won’t necessarily happen because a hacker targets a specific car. In most cases, hackers will gain access to a user’s online profile first, then wait for it to get linked to a vehicle. “[If] the app in your phone or your Web portal credentials get hacked, an attacker will have access to the data of your car,” Diaz said. “They could see all the details of your car, even its location, and in some cases be able to unlock the doors. All this may start with a simple phishing message, so consumers should be aware of what this new ecosystem represents and the consequences.”
Automakers say they take such threats seriously and are working to prevent them, though some point out that no one has successfully pulled off a real-world wireless hack. But that doesn’t mean it can’t or won’t happen, security experts warn. “Manufacturers need to really start considering what happens when someone does compromise a portion of their vehicle instead of assuming no one will,” Valasek said.
For now, he and his fellow “good-guy” hackers will keep making cars go haywire, warning of the threats they expose and hoping their finds help keep the road free of malicious hackers.
What We're Following See More »
Along party lines, the Federal Communications Commission on Thursday voted to tighten privacy standards for Internet service providers. "The regulations will require providers to receive explicit customer consent before using an individual’s web browsing or app usage history for marketing purposes. The broadband industry fought to keep that obligation out of the rules."
President Obama commuted the sentences of another 98 drug offenders on Thursday. Most of the convicts were charged with conspiracy to distribute drugs or possession with intent to distribute. Many of the sentences were commuted to expire next year, but some will run longer. Others are required to enroll in residential drug treatment as a condition of their release.
The Department of Justice announced today it's charged "61 individuals and entities for their alleged involvement in a transnational criminal organization that has victimized tens of thousands of persons in the United States through fraudulent schemes that have resulted in hundreds of millions of dollars in losses. In connection with the scheme, 20 individuals were arrested today in the United States and 32 individuals and five call centers in India were charged for their alleged involvement. An additional U.S.-based defendant is currently in the custody of immigration authorities."
Evan McMullin, the independent conservative candidate who may win his home state of Utah, is quietly planning to turn his candidacy into a broader movement for principled conservatism. He tells BuzzFeed he's "skeptical" that the Republican party can reform itself "within a generation" and that the party's internal "disease" can't be cured via "the existing infrastructure.” The ex-CIA employee and Capitol Hill staffer says, “I have seen and worked with a lot of very courageous people in my time [but] I have seen a remarkable display of cowardice over the last couple of months in our leaders.” McMullin's team has assembled organizations in the 11 states where he's on the ballot, and adviser Rick Wilson says "there’s actually a very vibrant market for our message in the urban northeast and in parts of the south."