Security Researchers Hack Car
Posted: Wed May 19, 2010 5:53 pm
http://www.purebasic.com
https://www.purebasic.fr/english/
.zdnet.com/clicks?t=543251939- ... =ZDNET&s=5
True - but the important bit is "almost two years ago they went to the car manufacturers and pointed this out to them waiting for correction, they were not taken seriously." That and the fact that theseSFSxOI wrote:Old news, nothing really new, just different more dedicated methods. The only reason they are coming forth now is that almost two years ago they went to the car manufacturers and pointed this out to them waiting for correction, they were not taken seriously. So, if the car manufacturers don't care then why should the public not be made aware that all those bells and whistles they spent money on can be hacked and stolen as easy as 1-2-3 if you know how. Plus, its in vogue lately to go after car manufacturers.
That's what I was wondering - if they were accessed remotely via wireless connections. I remember when I was in highAlthough these experiments are not easy to do (yet) — they require physical or wireless access to the car and some sophisticated tools — the researchers believe they are the first to look at cars as networked systems and to systematically exploit actual security holes instead of talking about holes in theory.
Even the article is outdated. They have also found a better way to do it for the ones that have BlueTooth recently. They have even developed an experimental BlueTooth device, they walk up to the car and do what they want including unlocking the doors, starting the car, and on some models disabling the factory provided lo-jack system and alarm system. Takes about 3 seconds with pre-programmed commands.aaron wrote:This is stupid scare mongering as near as i can tell. They connected to the OBDII port on the car... this requires physical access to the interior of the car. They then were able to monitor the car system and access the various bits of the car. OMG! :roll: This is on the same order as breaking into your car and then pressing your brake pedal.
With physical access, complete control of any system is possible. This is news? I mean, they could have removed the brake pads or disconnected some steering linkage. Its no different than what they "accomplished".
Do you have a link for that? I have to admit that I'm a little skeptical. Bluetooth is limited to just audio in any of the cars that I've seen. I'm having a hard time imagining that Bluetooth is linked into the main car system in that manner. Searching for hack car with bluetooth turns up some 5 year old articles on a 'car whisperer' where some guys who can hardly be called hackers are pairing with bluetooth devices in a car and then monitoring audio.SFSxOI wrote:Even the article is outdated. They have also found a better way to do it for the ones that have BlueTooth recently. They have even developed an experimental BlueTooth device, they walk up to the car and do what they want including unlocking the doors, starting the car, and on some models disabling the factory provided lo-jack system and alarm system. Takes about 3 seconds with pre-programmed commands.
No, I don't have a link that describes it, not everything in the world appears on the internet ya know. I found out about it because the company I work for does contract work for a car manufacturer (i'm not able to disclose the name due to NDA reasons) for their network security vunlerability testing, and their manufacturing people contacted us asking about the possibility of testing one of their models for vunlerability against this. They told us what was going on and believed their model was vunlerable. They sent some documents along and part of those included the latest research from (i'm not able to disclose the name due to NDA reasons) which outlined the bluetooth attack method against the type of system used in the model. In this model bluetooth is not just limited to audio, its also linked into the core system, and may not outwardly do anything well known but audio to the consumer but its does more when "approached" properly.aaron wrote:Do you have a link for that? I have to admit that I'm a little skeptical. Bluetooth is limited to just audio in any of the cars that I've seen. I'm having a hard time imagining that Bluetooth is linked into the main car system in that manner. Searching for hack car with bluetooth turns up some 5 year old articles on a 'car whisperer' where some guys who can hardly be called hackers are pairing with bluetooth devices in a car and then monitoring audio.SFSxOI wrote:Even the article is outdated. They have also found a better way to do it for the ones that have BlueTooth recently. They have even developed an experimental BlueTooth device, they walk up to the car and do what they want including unlocking the doors, starting the car, and on some models disabling the factory provided lo-jack system and alarm system. Takes about 3 seconds with pre-programmed commands.
The link with more info on these latest guys shows that they are just using the existing OBDII ports:
http://www.neowin.net/news/car-electron ... ments=true
Any speculation on hacking a car wirelessly is basically hand waving on possible future flaws that could potentially exist.
Rook Zimbabwe wrote:OnStar...
....It is EVIL!!! It allows you to remotely open the door locks... the windows and sunroof, remotely KILL a car as well......
Fair enough. If you have some personal experience with it, that's more convincing.SFSxOI wrote:I found out about it because the company I work for does contract work for a car manufacturer (i'm not able to disclose the name due to NDA reasons) for their network security vunlerability testing, and their manufacturing people contacted us asking about the possibility of testing one of their models for vunlerability against this. They told us what was going on and believed their model was vunlerable. They sent some documents along and part of those included the latest research from (i'm not able to disclose the name due to NDA reasons) which outlined the bluetooth attack method against the type of system used in the model.