Endpoint

3/28/2007
07:50 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Hacking the Car Navigation System

Italian researchers reveal attack methods on RDS-TMC navigation systems

If you find you're relying a little too much on your car's navigation system, beware: Italian researchers have discovered a way to hack into some of these systems and potentially "own" the messages your car gives you and where it tells you to go.

At risk are satellite-based navigation systems that use Radio Data System-Traffic Message Channel (RDS-TMC) to receive traffic broadcasts and emergency messages, a technology that is widely deployed in vehicles throughout Europe and increasingly, North America, says Andrea Barisani, chief security engineer of Inverse Path. Barisani and Inverse Path's hardware hacker Daniele Bianco built tools that let an attacker inject fake messages to the navigation system, or launch a denial-of-service attack.

RDS-TMC provides broadcasts on traffic conditions, accidents, and detours for the driver. (RDS is also used to display the name of the radio station you're listening to on satellite radio.) The technology doesn't authenticate where the traffic comes from, so an intruder could easily send a bogus message of a road closure, rerouting drivers to another road, Barisani says. Or an attacker could pummel the system with messages and cause a denial-of-service (DOS) attack, which could crash not only a car's navigation system, but its climate control system, and stereo, too, he says.

Barisani says the criminal or terrorist element would most likely be attracted to this type of attack. "If you're a hit man, you can use that kind of system to detour or ambush someone on any street you want," he says. "We can also send sensitive messages about security events, [weather conditions], or related to terrorist incidents."

He says he got the idea of trying to perform this type of hack from his new vehicle, which uses one of these navigation systems. "There is no authentication," he says. "So I started to wonder if you could inject false traffic information into them."

"We were amazed you could put in such powerful messages and they were not authenticated in any way," he says.

To execute the exploits, the researchers built a packet-sniffer that decodes messages sent to RDS, and they plan to release a full suite of the hacking tools at next month's CanSecWest conference, where they will present their new research. They also cobbled together a transmitter to send the bogus messages, which they built using an RDS encoder you can buy off the shelf at an electronics store.

So far, they've tested the hack on navigation systems in European TomTom and Honda, Barisani says, but it will affect any navigation system based on RDS-TMC.

Clear Channel Radio's RDS-TMC-based Total Traffic Network traffic data service is likely vulnerable, he says, although he has not tested it. MINI USA and BMW, for instance, offer Total Traffic Network services in their vehicles.

Meanwhile, the good news is user data or privacy is not at risk with these types of attacks, since the attacker could only send, not grab, data.

"We're basically trying to fuzz the navigator, send it some incorrect information, and see how it would react," he says.

The researchers tested the hardware within one to five kilometers of the vehicles. An attacker could also target a specific vehicle by using a directional antenna, Barisani says, or by tweaking the power output.

Meanwhile, there are some emerging technologies for car navigation systems that could provide some protection for drivers. One thing coming out: The Transport Protocol Experts Group (TPEG) is developing a successor to RDS that can be transported over XML or digital binary format (RDS uses analog transport). It doesn't add any authentication, Barisani says, but it would be more difficult for an attacker to inject traffic into this digital format.

There's also the Global System for Telematics (GST), a European effort that would add protocols for navigation systems that let cars communicate with one another, for instance, Barisani says. GST -- which is at least five years away from availability -- will include encryption, so it would be less susceptible to attacks, he sys.

For now, there's not much you can do to determine whether your navigation system is under attack. Not until you find yourself in some deserted road far from your destination, that is. "We wanted to expose this problem. We think it's a [potentially] pretty severe one," he says. "No one has bothered looking into this, and there's no other research about it."

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Inverse Path Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    8 Ways Hackers Monetize Stolen Data
    Steve Zurier, Freelance Writer,  4/17/2018
    Securing Social Media: National Safety, Privacy Concerns
    Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
    Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
    Sara Peters, Senior Editor at Dark Reading,  4/19/2018
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    How to Cope with the IT Security Skills Shortage
    Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
    Flash Poll
    [Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
    [Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2017-0290
    Published: 2017-05-09
    NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

    CVE-2016-10369
    Published: 2017-05-08
    unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

    CVE-2016-8202
    Published: 2017-05-08
    A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

    CVE-2016-8209
    Published: 2017-05-08
    Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

    CVE-2017-0890
    Published: 2017-05-08
    Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.