Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:15 PM
Connect Directly

The Summer Of Car Hacks Continues

New research shows how SMS messages manipulating vulns in insurance dongles can kill brakes on cars.

The summer of car hacks continues this week as another set of researchers demonstrated how it's possible to affect the control of a car's braking system without even engaging with any electronics embedded in the car itself. Apparently, all it really takes is just going after the Internet-connected devices that car insurance companies are increasingly using to track their customers' driving habits.

Introduced this week at the Usenix security conference in Washington, D.C., the new discovery shows that it is possible to control the braking system and other central mechanisms in cars via SMS text messaging. All this is made possible through vulnerabilities in a dongle developed by a French firm to be used by insurance companies seeking to charge insurance on a per-mile basis. Called the OBD2 dongle, the version examined by these researchers from the University of California San Diego was specifically one distributed by San Francisco-based Metromile Insurance.

The demonstration follows closely on the heels of demonstrations at Black Hat of how attackers could kill the engine in a 2014 Jeep Cherokee from as far away as 70 miles by taking advantage of an open port in the cellular connection used by the car's infotainment system.

Image Source: Black Hat Events 
Famed car hackers Charlie Miller and Chris Valasek at Black Hat 2015.
Image Source: Black Hat Events
Famed car hackers Charlie Miller and Chris Valasek at Black Hat 2015.

The new development only emphasizes the fact that cars are increasingly becoming rolling networks.

“One of the trends I am seeing in automotive system vulnerabilities is that many of these systems are using networks and protocols designed for cellular and IP networks," says Ken Westin, security analyst for Tripwire. "These tools were designed to facilitate human-to-human interaction."

As he explains, when these types of networks and protocols are repurposed for machine-to-machine interactions, they present a whole new category of threats.

"When a cell phone is compromised, there is a potential for data to be compromised, which is an inconvenience," he says. "However, when machine-to-machine communications over cellular or IP networks are compromised, it lead to a kinetic attack that could result in serious injury  or even loss of life.”

But even if car manufacturers completely lock down the core systems within their own stock embedded hardware and firmware, they're creating a new networked environment that makes it possible to exploit third-party weaknesses in communications instead.

"Think twice about what you’re plugging into your car,” UCSD's Karl Koscher told Wired. “It’s hard for the regular consumer to know that their device is trustworthy or not, but it’s something they should give a moment’s thought to. Is this exposing me to more risk? Am I ok with that?”

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
8/16/2015 | 12:11:24 PM
Re: Church and state
I think like you, the security is the most important thing than other things for the cars. For my part i prefer a slowly car but a secure one. I hope the future will increase the security.
User Rank: Ninja
8/14/2015 | 9:59:43 AM
Re: Church and state
Very much agree with both of your statements. Having a "what you have" (physical device) drastically increases your security, in not only this aspect but many others as well.

Maybe having the car keys double as a key fob? That would be interesting.
User Rank: Ninja
8/14/2015 | 6:56:23 AM
Church and state
Much like the way most airplanes separate the networks of its flight controls and the entertainment systems, surely that should be taking place in commercial vehicles now they are becoming more connected? 

Similarly so, I'd like to see some kind of hardware key system, whereby the owner of a vehicle needs to manually approve updates by being physically present with the vehicle, while it's not running. Wireless updates without much input from the user seems like too dangerous a tack to take. 
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.
PUBLISHED: 2019-11-15
On version 14.0.0-, BIG-IP virtual servers with TLSv1.3 enabled may experience a denial of service due to undisclosed incoming messages.
PUBLISHED: 2019-11-15
On BIG-IP 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.1, undisclosed HTTP requests may consume excessive amounts of systems resources which may lead to a denial of service.
PUBLISHED: 2019-11-15
When the BIG-IP APM 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-, 12.1.0-, or 11.5.1-11.6.5 system processes certain requests, the APD/APMD daemon may consume excessive resources.