One day soon, your new car will come loaded with apps that can play live baseball games from across the country or read news articles aloud. Buy a Toyota? Apple’s CarPlay will turn it into an iPhone on wheels. Opt for a Hyundai, and you’ll get Google’s Android operating system built into the dashboard. And most major automakers are planning to offer both.
That’s sure to stir up excitement among tech-savvy consumers, but it also has hackers imagining a whole new world of opportunity.
“Can some 14-year-old in Indonesia figure out how to [hack] this and just shut your car down “¦ because everything is now wired up?” asked Sen. Jay Rockefeller in a hearing last year.
That worry, while sounding rather dystopic, isn’t necessarily unrealistic, said Chris Valasek, who handles security intelligence for IOActive, a security firm. That’s because Valasek, while not a teenager from Southeast Asia, has taken car-hacking to a scary level.
Last year, Valasek and hacking partner Charlie Miller linked a laptop to the data port of a Ford Escape. Sitting in the backseat while a reporter drove, they changed the fuel indicator level, upped the speedometer reading to 199 mph and activated the horn. Then, mid-drive, they jerked the steering wheel back and forth and deactivated the vehicle’s brakes (an earlier test sent Miller into the back wall of his garage).
If that sounds frightening, Valasek says, it’s time to imagine the possibility that tomorrow’s hackers won’t need a plug-in cable — and they could do more than give their victims a little scare. “There’s a lot of wireless communications in the car, and I assume connected vehicles will add more wireless communications,” he said. “The more ways to wirelessly communicate with something, the more attack surface there is. Added complexity many times gives an attacker more ways to attempt to get into a vehicle.”
Attack surface is another way of describing the wireless entry points to a vehicle. Cars can use cellular networks to place calls or receive navigation. They use Wi-Fi to connect devices in the vehicle to the Internet. They link to phones with Bluetooth. Even their tires can send wireless signals to indicate low pressure.
Today’s cars have upward of 100 microprocessors to sort this data and send signals throughout the vehicle. The problem comes when one of these signals is breached. A computer, by contrast, has safeguards to protect systems like disk storage if another area, such as a Web browser, is hacked. This is known as preventing “lateral movement.”
“Cars aren’t really there yet,” Valasek said. “Many automobiles don’t have a layered approach to security right now. They just assume somebody can’t break in.”¦ You want to segregate portions.”
And while the internal workings of today’s cars lack protection, the software of tomorrow’s vehicles will add another challenge. With Android and CarPlay on the horizon — and most automakers on board — a whole generation of cars will soon hit the road en masse with virtually identical operating systems.
“The new operating systems will make the market less heterogeneous, which potentially is more dangerous,” said Vicente Diaz, a security researcher at Kaspersky Lab. “Attackers will be more familiar with these systems.”
Of course, hackers have already had years to practice breaking into those systems on mobile devices. “People have been hacking those operating systems for a long time,” Valasek said. “It may give them a more familiar method to get in.”
Another issue, Diaz warned, is that while phones tend to get replaced every few years, the longer lifespan of a car could make it increasingly vulnerable as time goes on.
Without further testing, it’s hard to say just what a cybercriminal could do with a given hack. No one knows how hard it would be to wirelessly replicate Valasek’s complete control of a car — or how many vehicles will suffer that vulnerability.
But other concerns could give car buyers pause. Hackers could steal a driver’s location data or use Bluetooth to activate a phone’s microphone and eavesdrop. Some remote unlock applications could even let hackers gain entry to a vehicle.
These violations won’t necessarily happen because a hacker targets a specific car. In most cases, hackers will gain access to a user’s online profile first, then wait for it to get linked to a vehicle. “[If] the app in your phone or your Web portal credentials get hacked, an attacker will have access to the data of your car,” Diaz said. “They could see all the details of your car, even its location, and in some cases be able to unlock the doors. All this may start with a simple phishing message, so consumers should be aware of what this new ecosystem represents and the consequences.”
Automakers say they take such threats seriously and are working to prevent them, though some point out that no one has successfully pulled off a real-world wireless hack. But that doesn’t mean it can’t or won’t happen, security experts warn. “Manufacturers need to really start considering what happens when someone does compromise a portion of their vehicle instead of assuming no one will,” Valasek said.
For now, he and his fellow “good-guy” hackers will keep making cars go haywire, warning of the threats they expose and hoping their finds help keep the road free of malicious hackers.
What We're Following See More »
A Russian government think tank run by Putin loyalists "developed a plan to swing the 2016 U.S. presidential election to Donald Trump and undermine voters’ faith in the American electoral system." Two confidential documents from the Putin-backed Institute for Strategic Studies, obtained by U.S. intelligence, provide "the framework and rationale for what U.S. intelligence agencies have concluded was an intensive effort by Russia to interfere with the Nov. 8 election."
"The FBI last year used a dossier of allegations of Russian ties to Donald Trump's campaign as part of the justification" to monitor Carter Page, who was then a defense adviser to the Trump campaign. "The dossier has also been cited by FBI Director James Comey in some of his briefings to members of Congress in recent weeks."
"The Air Force is set to deploy its high-tech, fifth-generation F-35A fighter jets to Europe this weekend as part of an effort to assure U.S. allies there who are worried about Russian aggression." The new, state-of-the-art fighters will train with European air units. "The Pentagon noted that the deployment had been long planned, meaning it was not a reaction to recent increasing tensions between the United States and Russia," although a statement noted the move is part of the "European Reassurance Initiative," which began three years ago when Russia annexed Crimea.