What Happens When Your Car Gets Hacked?

Connected cars could give cybercriminals a whole new range of targets.

National Journal
Alex Brown
Add to Briefcase
Alex Brown
July 23, 2014, 10:41 a.m.

One day soon, your new car will come loaded with apps that can play live base­ball games from across the coun­try or read news art­icles aloud. Buy a Toyota? Apple’s Car­Play will turn it in­to an iPhone on wheels. Opt for a Hy­undai, and you’ll get Google’s An­droid op­er­at­ing sys­tem built in­to the dash­board. And most ma­jor auto­makers are plan­ning to of­fer both.

That’s sure to stir up ex­cite­ment among tech-savvy con­sumers, but it also has hack­ers ima­gin­ing a whole new world of op­por­tun­ity.

“Can some 14-year-old in In­done­sia fig­ure out how to [hack] this and just shut your car down “¦ be­cause everything is now wired up?” asked Sen. Jay Rock­e­feller in a hear­ing last year.

That worry, while sound­ing rather dystop­ic, isn’t ne­ces­sar­ily un­real­ist­ic, said Chris Valasek, who handles se­cur­ity in­tel­li­gence for IO­Act­ive, a se­cur­ity firm. That’s be­cause Valasek, while not a teen­ager from South­east Asia, has taken car-hack­ing to a scary level.

Last year, Valasek and hack­ing part­ner Charlie Miller linked a laptop to the data port of a Ford Es­cape. Sit­ting in the back­seat while a re­port­er drove, they changed the fuel in­dic­at­or level, upped the speedo­met­er read­ing to 199 mph and ac­tiv­ated the horn. Then, mid-drive, they jerked the steer­ing wheel back and forth and de­ac­tiv­ated the vehicle’s brakes (an earli­er test sent Miller in­to the back wall of his gar­age).

If that sounds fright­en­ing, Valasek says, it’s time to ima­gine the pos­sib­il­ity that to­mor­row’s hack­ers won’t need a plug-in cable — and they could do more than give their vic­tims a little scare. “There’s a lot of wire­less com­mu­nic­a­tions in the car, and I as­sume con­nec­ted vehicles will add more wire­less com­mu­nic­a­tions,” he said. “The more ways to wire­lessly com­mu­nic­ate with something, the more at­tack sur­face there is. Ad­ded com­plex­ity many times gives an at­tack­er more ways to at­tempt to get in­to a vehicle.”

At­tack sur­face is an­oth­er way of de­scrib­ing the wire­less entry points to a vehicle. Cars can use cel­lu­lar net­works to place calls or re­ceive nav­ig­a­tion. They use Wi-Fi to con­nect devices in the vehicle to the In­ter­net. They link to phones with Bluetooth. Even their tires can send wire­less sig­nals to in­dic­ate low pres­sure.

Today’s cars have up­ward of 100 mi­cro­pro­cessors to sort this data and send sig­nals throughout the vehicle. The prob­lem comes when one of these sig­nals is breached. A com­puter, by con­trast, has safe­guards to pro­tect sys­tems like disk stor­age if an­oth­er area, such as a Web browser, is hacked. This is known as pre­vent­ing “lat­er­al move­ment.”

“Cars aren’t really there yet,” Valasek said. “Many auto­mo­biles don’t have a layered ap­proach to se­cur­ity right now. They just as­sume some­body can’t break in.”¦ You want to se­greg­ate por­tions.”

And while the in­tern­al work­ings of today’s cars lack pro­tec­tion, the soft­ware of to­mor­row’s vehicles will add an­oth­er chal­lenge. With An­droid and Car­Play on the ho­ri­zon — and most auto­makers on board — a whole gen­er­a­tion of cars will soon hit the road en masse with vir­tu­ally identic­al op­er­at­ing sys­tems.

“The new op­er­at­ing sys­tems will make the mar­ket less het­ero­gen­eous, which po­ten­tially is more dan­ger­ous,” said Vi­cente Diaz, a se­cur­ity re­search­er at Kasper­sky Lab. “At­tack­ers will be more fa­mil­i­ar with these sys­tems.”

Of course, hack­ers have already had years to prac­tice break­ing in­to those sys­tems on mo­bile devices. “People have been hack­ing those op­er­at­ing sys­tems for a long time,” Valasek said. “It may give them a more fa­mil­i­ar meth­od to get in.”

An­oth­er is­sue, Diaz warned, is that while phones tend to get re­placed every few years, the longer lifespan of a car could make it in­creas­ingly vul­ner­able as time goes on.

Without fur­ther test­ing, it’s hard to say just what a cy­ber­crim­in­al could do with a giv­en hack. No one knows how hard it would be to wire­lessly rep­lic­ate Valasek’s com­plete con­trol of a car — or how many vehicles will suf­fer that vul­ner­ab­il­ity.

But oth­er con­cerns could give car buy­ers pause. Hack­ers could steal a driver’s loc­a­tion data or use Bluetooth to ac­tiv­ate a phone’s mi­cro­phone and eaves­drop. Some re­mote un­lock ap­plic­a­tions could even let hack­ers gain entry to a vehicle.

These vi­ol­a­tions won’t ne­ces­sar­ily hap­pen be­cause a hack­er tar­gets a spe­cif­ic car. In most cases, hack­ers will gain ac­cess to a user’s on­line pro­file first, then wait for it to get linked to a vehicle. “[If] the app in your phone or your Web portal cre­den­tials get hacked, an at­tack­er will have ac­cess to the data of your car,” Diaz said. “They could see all the de­tails of your car, even its loc­a­tion, and in some cases be able to un­lock the doors. All this may start with a simple phish­ing mes­sage, so con­sumers should be aware of what this new eco­sys­tem rep­res­ents and the con­sequences.”

Auto­makers say they take such threats ser­i­ously and are work­ing to pre­vent them, though some point out that no one has suc­cess­fully pulled off a real-world wire­less hack. But that doesn’t mean it can’t or won’t hap­pen, se­cur­ity ex­perts warn. “Man­u­fac­tur­ers need to really start con­sid­er­ing what hap­pens when someone does com­prom­ise a por­tion of their vehicle in­stead of as­sum­ing no one will,” Valasek said.

For now, he and his fel­low “good-guy” hack­ers will keep mak­ing cars go hay­wire, warn­ing of the threats they ex­pose and hop­ing their finds help keep the road free of ma­li­cious hack­ers.

What We're Following See More »
FCC Tightens Internet Privacy Standards
5 hours ago

Along party lines, the Federal Communications Commission on Thursday voted to tighten privacy standards for Internet service providers. "The regulations will require providers to receive explicit customer consent before using an individual’s web browsing or app usage history for marketing purposes. The broadband industry fought to keep that obligation out of the rules."

Obama Commutes Another 98 Sentences
6 hours ago

President Obama commuted the sentences of another 98 drug offenders on Thursday. Most of the convicts were charged with conspiracy to distribute drugs or possession with intent to distribute. Many of the sentences were commuted to expire next year, but some will run longer. Others are required to enroll in residential drug treatment as a condition of their release.

DOJ Busts More Than 50 for Call Center Scam
6 hours ago

The Department of Justice announced today it's charged "61 individuals and entities for their alleged involvement in a transnational criminal organization that has victimized tens of thousands of persons in the United States through fraudulent schemes that have resulted in hundreds of millions of dollars in losses. In connection with the scheme, 20 individuals were arrested today in the United States and 32 individuals and five call centers in India were charged for their alleged involvement. An additional U.S.-based defendant is currently in the custody of immigration authorities."

Johnson on Ballot Everywhere, Followed by Stein, McMullin
8 hours ago
Is McMullin Building the GOP in Exile?
10 hours ago

Evan McMullin, the independent conservative candidate who may win his home state of Utah, is quietly planning to turn his candidacy into a broader movement for principled conservatism. He tells BuzzFeed he's "skeptical" that the Republican party can reform itself "within a generation" and that the party's internal "disease" can't be cured via "the existing infrastructure.” The ex-CIA employee and Capitol Hill staffer says, “I have seen and worked with a lot of very courageous people in my time [but] I have seen a remarkable display of cowardice over the last couple of months in our leaders.” McMullin's team has assembled organizations in the 11 states where he's on the ballot, and adviser Rick Wilson says "there’s actually a very vibrant market for our message in the urban northeast and in parts of the south."


Welcome to National Journal!

You are currently accessing National Journal from IP access. Please login to access this feature. If you have any questions, please contact your Dedicated Advisor.