Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:15 PM
Connect Directly

The Summer Of Car Hacks Continues

New research shows how SMS messages manipulating vulns in insurance dongles can kill brakes on cars.

The summer of car hacks continues this week as another set of researchers demonstrated how it's possible to affect the control of a car's braking system without even engaging with any electronics embedded in the car itself. Apparently, all it really takes is just going after the Internet-connected devices that car insurance companies are increasingly using to track their customers' driving habits.

Introduced this week at the Usenix security conference in Washington, D.C., the new discovery shows that it is possible to control the braking system and other central mechanisms in cars via SMS text messaging. All this is made possible through vulnerabilities in a dongle developed by a French firm to be used by insurance companies seeking to charge insurance on a per-mile basis. Called the OBD2 dongle, the version examined by these researchers from the University of California San Diego was specifically one distributed by San Francisco-based Metromile Insurance.

The demonstration follows closely on the heels of demonstrations at Black Hat of how attackers could kill the engine in a 2014 Jeep Cherokee from as far away as 70 miles by taking advantage of an open port in the cellular connection used by the car's infotainment system.

Image Source: Black Hat Events 
Famed car hackers Charlie Miller and Chris Valasek at Black Hat 2015.
Image Source: Black Hat Events
Famed car hackers Charlie Miller and Chris Valasek at Black Hat 2015.

The new development only emphasizes the fact that cars are increasingly becoming rolling networks.

“One of the trends I am seeing in automotive system vulnerabilities is that many of these systems are using networks and protocols designed for cellular and IP networks," says Ken Westin, security analyst for Tripwire. "These tools were designed to facilitate human-to-human interaction."

As he explains, when these types of networks and protocols are repurposed for machine-to-machine interactions, they present a whole new category of threats.

"When a cell phone is compromised, there is a potential for data to be compromised, which is an inconvenience," he says. "However, when machine-to-machine communications over cellular or IP networks are compromised, it lead to a kinetic attack that could result in serious injury  or even loss of life.”

But even if car manufacturers completely lock down the core systems within their own stock embedded hardware and firmware, they're creating a new networked environment that makes it possible to exploit third-party weaknesses in communications instead.

"Think twice about what you’re plugging into your car,” UCSD's Karl Koscher told Wired. “It’s hard for the regular consumer to know that their device is trustworthy or not, but it’s something they should give a moment’s thought to. Is this exposing me to more risk? Am I ok with that?”

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
8/16/2015 | 12:11:24 PM
Re: Church and state
I think like you, the security is the most important thing than other things for the cars. For my part i prefer a slowly car but a secure one. I hope the future will increase the security.
User Rank: Ninja
8/14/2015 | 9:59:43 AM
Re: Church and state
Very much agree with both of your statements. Having a "what you have" (physical device) drastically increases your security, in not only this aspect but many others as well.

Maybe having the car keys double as a key fob? That would be interesting.
User Rank: Ninja
8/14/2015 | 6:56:23 AM
Church and state
Much like the way most airplanes separate the networks of its flight controls and the entertainment systems, surely that should be taking place in commercial vehicles now they are becoming more connected? 

Similarly so, I'd like to see some kind of hardware key system, whereby the owner of a vehicle needs to manually approve updates by being physically present with the vehicle, while it's not running. Wireless updates without much input from the user seems like too dangerous a tack to take. 
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google Maps is taking "interactive" to a whole new level!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-17
A heap based buffer overflow vulneraibility exists in GNU LibreDWG 0.10 via bit_calc_CRC ../../src/bits.c:2213.
PUBLISHED: 2021-05-17
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2417.
PUBLISHED: 2021-05-17
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via: read_2004_section_classes ../../src/decode.c:2440.
PUBLISHED: 2021-05-17
A null pointer deference issue exists in GNU LibreDWG 0.10 via get_bmp ../../programs/dwgbmp.c:164.
PUBLISHED: 2021-05-17
A null pointer deference issue exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2337.