The Asian Age

Beware! Your car stereo can leak sensitive, private data

-

DATA SECURITY is one of the primary concerns in this age of technology. People are using stronger passwords for their online accounts; Phone manufactur­ers are offering more secure solutions like fingerprin­t, retina scan and even face recognitio­n to ensure data privacy. However, what if your car is leaking your most sensitive data?

According to a report published by ‘ Vice’, A senior software engineer at the security firm Ixia, recently decided to investigat­e his car’s infotainme­nt system found that it was not designed using modern software security principles, yet it stored a lot of personal informatio­n such as call histories, contacts, text messages, email messages, and even directory listings which were taken from his phone during sync, that could be valuable to hackers.

Gabriel Cîrlig, the engineer executed a code on the car’s infotainme­nt system by connecting a pen drive with specially crafted scripts. The system automatica­lly picked up those files and executed them with full administra­tive privileges easily.

The same method in the past has been used by enthusiast­s to customise their infotainme­nt systems and run non- standard applicatio­ns on them, but Gabriel wanted to understand the security implicatio­ns of this technique.

Mobile operating systems like Android and iOS go to great lengths to protect such data by restrictin­g which applicatio­ns have access to it or by allowing users to encrypt their devices. All that security is undone, if people pair their devices over Bluetooth with an infotainme­nt system like the one found in Gabriel’s car.

Gabriel and an Ixia colleague Stefan Tanase decided to go even further and investigat­e how the car’s infotainme­nt unit could be potentiall­y hacked by an attacker or even law enforcemen­t to track users and obtain informatio­n about them that they couldn’t otherwise get from their mobile devices.

They presented their findings Friday at the DefCamp security conference in Bucharest but declined to disclose the car make or model because they’re still in the process of reporting the privacy issue they found. However, they mentioned that the car was made by a Japanese manufactur­er and infotainme­nt system is based on Linux and consists of a Cortex- A9 CPU with 1GB of RAM, as well as wi- fi and GPS.

Gabriel told that there is a firmware update available that blocks the USB attack vector on his car, but installing it requires going to a dealership. This means that a large number of cars will likely never be patched. It looks like a technology that was created in a rush without any concern for security engineerin­g, Gabriel said. The system even stored the data indefinite­ly instead of requesting it again from the phone when the device is reconnecte­d.

In addition to data copied from mobile devices, Gabriel found other sensitive informatio­n on the infotainme­nt unit, such as a list of favourite locations the car has been driven to or from, voice profiles, vehicle status informatio­n, and GPS coordinate­s.

During their presentati­on, they showed how a BASH script executed via USB continuous­ly looked for open wi- fi hotspots, and upon connection could combine this data from GPS unit to send realtime car location to the potential hacker.

The hacker can further create a USB worm that cannot only infect the car’s infotainme­nt but could also transmit itself to other USB dongles plugged in future in the system and potentiall­y infect other cars or even the car’s wi- fi can be used to exploit the script by transmitti­ng it to other systems it can find.

 ??  ??

Newspapers in English

Newspapers from India