Scottish Daily Mail

The computer hackers who can hijack your car — and make you crash

- by Guy Walters

The triumphant shout of ‘You’re doomed!’ came in an iPhone call from the hacker who had remotely hijacked a Jeep Cherokee on a motorway, cutting the transmissi­on and leaving its driver powerless.

The accelerato­r stopped working and the Jeep slowed to a crawl on a flyover where there was no hard shoulder to pull over and the traffic was moving at a steady 70 mph.

In the mirror, the driver could see a lorry bearing down on his paralysed Jeep. holding his mobile with a clammy hand, he begged the hackers: ‘Make it stop.’

In one sense the driver, Andy Greenberg, was lucky. he managed to roll his Jeep down an exit ramp and got it going again by turning the ignition off and on. The hackers could have killed the engine altogether, slammed on the brakes or, worse, disabled them — as they did later.

‘The most disturbing manoeuvre came when they cut the Jeep’s brakes, leaving me franticall­y pumping the pedal as the two-ton vehicle slid uncontroll­ably into a ditch,’ he says.

Greenberg, a writer on the technology magazine Wired, had agreed to be the guinea pig driver for two U.S. tech wizards, Charlie Miller and Chris Valasek, whose exploits hacking cars’ entertainm­ent, telephone and navigation systems have sent tremors through the motor industry.

From his terrifying account, it would appear that Miller and Valasek have worked out how to control a car remotely, over the internet, without having physical access to the vehicle in any shape or form. If that sounds scary, it is.

Cars are already under attack as never before as the gadgetry they contain grows more complex and thus more vulnerable to would-be thieves. Modern cars typically contain 50 low-powered computers — enabling services such as wifi, Bluetooth, satnav and even the informatio­n screen — which can offer tempting entry points to criminals.

In Britain, tens of thousands of cars are stolen or broken into every year by thieves using electronic hacking equipment bought from websites based mainly in Bulgaria. Instead of smashing windows or forcing door locks, the criminals arm themselves with equipment that can intercept signals from key fobs to get into cars or that plugs into onboard computers remotely.

This month, Range Rover issued a recall to fix a software security flaw that could be used to unlock its vehicles’ doors.

Technology researcher­s, seeking to push the frontiers of their knowhow — and force the motor industry to take its head out of the sand over the issue — have for several years been seeking ways to hack cars’ computers and bypass their security systems.

But Miller and Valasek have gone much further. The duo proved this week that they can wirelessly carjack Jeep Cherokees via the internet, armed with just a basic mobile phone and a laptop loaded with their own software, from just about anywhere. In theory, they could engineer any number of nightmare scenarios.

In Greenberg’s Jeep, the attack began when freezing air came coursing through vents at the maximum setting. The voice of pop star Kanye West erupted from the radio at top volume and Greenberg couldn’t switch him off.

The windscreen wipers started up and screenwash squirted across the screen. Then Miller and Valasek disabled the engine.

It could get worse. According to Greenberg, t he hackers are ‘perfecting their steering control — for now, they can only hijack the wheel when the Jeep is in reverse’.

So, how exactly is it done? And what are car manufactur­ers doing to stop it?

At present, there are two ways to hack a car. The first and easier method involves procuring a small box of electronic tricks the size of a credit card called a CANtact, which can be bought online from the U.S. for just $60 (£38). The manufactur­er also supplies instructio­ns on how to build your own, which makes it even cheaper.

This device must be physically connected to a car, via one of the connection points on the vehicle’s Controller Area Network (CANbus): this i s the maze of wires and computers that forms your car’s electronic brain and is normally accessed by a garage mechanic, who plugs in a laptop to diagnose any faults.

Similarly, a would- be hacker must connect the CANtact and then attach it, either with a cable or wirelessly, to a computer, which i s then used to control your vehicle.

Last summer, a 14- year- old schoolboy stunned delegates at a conference of car engineers and computer security experts in the U.S. when he controlled a car with his iPhone and a mere £10 worth of electronic­s similar to a CANtact.

he was able to lock the doors, turn on the windscreen wipers, flash the headlights and even start the engine.

And at a computer security conference in Asia in March, eric evenchick, a systems developer, demonstrat­ed how he had hacked into a Chevrolet and, keeping the car in neutral, revved the engine to the maximum.

On a recent edition of the U.S. TV news programme 60 Minutes, two boffins from the military’s Defense Advanced Research Projects Agency (Darpa) controlled a car being driven by t he s how’s presenter, who smashed through some traffic cones after they disabled her brakes.

All these methods, however, required the hacker physically to access the car. Until this week, the chances of that happening were considered to be slight.

enter Miller and Valasek, who will showcase their research in a demonstrat­ion next month at a computer security conference in Las Vegas. On Twitter, Valasek put it succinctly. ‘[Miller] and I will show you how to hack a car by remote control,’ he tweeted. ‘ No wires. No mods [modificati­ons]. Straight off the showroom floor.’

The pair spent t hree years working on their technology, helped by an $ 80,000 (£ 51,300) research grant from Darpa.

They ripped cars apart to study their electronic­s and pored over manufactur­ers’ data.

In 2013, they demonstrat­ed an attack on a Toyota Prius and a Ford Maverick, using electronic components to take control of the cars’ smart steering, braking, accelerati­on, engines and lights.

They urged the makers to take notice of what they had done, pointing out that ‘drivers and passengers are strictly at the mercy of the code running in their automobile­s and, unlike when their web browser crashes or is compromise­d, the threat to their physical well-being is real’.

The makers rebuffed the research, pointing out that the pair had needed physical access to the vehicles.

This time round, no access was needed. And while they have so far experiment­ed only on Jeeps, they believe most of their attacks could be tweaked to work on any Chrysler vehicle equipped with Uconnect, an internet- connected computer feature found in more than 400,000 Fiat Chrysler cars, SUVs (sports utility vehicles) and lorries. They also believe that Cadillac’s escalade model and Infiniti’s Q50 rate high on the s scale of ‘hackabilit­y’.

As Valasek says: ‘For all the critics who said our work didn’t count because we were plugged into the dashboard, well, now what?’

According to Wired magazine, they have identified a vulnerable e element of the Uconnect mobile p phone connection that lets anyone who knows the car’s IP address (a unique string of numbers that identifies each computer) to gain access f rom anywhere i n the country. ‘ From an attacker’s perspectiv­e, it’ s a super- nice vulnerabil­ity,’ says Miller.

From that entry point, they concentrat­e on a chip in the entertainm­ent system, rewriting its memory to insert their own code. This means they can send commands t hrough t he car’s computer network to its physical parts, such as the engine and wheels.

Greenberg watched the two r researcher­s scan the internet for vehicles to ‘ carjack’ from Miller’s livingi room in Missouri.

Uconnect computers are linked t to the internet by a U.S. mobile network called Sprint, and only other Sprint devices can talk to them. Miller used a Sprint mobile phone in his search for targets.

Cars’ GPS co- ordinates would appear on the screen, plus their vehicle i dentificat­ion number, make, model and IP address, be it a Dodge Ram being driven in Texas, a Jeep Cherokee in Ohio or a Dodge Durango in Michigan. each vehicle would potentiall­y be vulnerable to a remote attack.

Miller and Valasek have been sharing their research with Fiat Chrysler Automobile­s (FCA) for nine months, enabling the company to release a ‘patch’ last week to close the security loopholes.

FCA said that it was ‘committed to providing customers with the latest software updates to secure vehicles against any potential vulnerabil­ity’ and lamented Miller and Valasek’s decision to go public with their findings.

The company said: ‘ Under no circumstan­ces does FCA condone or believe it appropriat­e to disclose “how-to” informatio­n that would potentiall­y encourage or help enable hackers to gain unauthoris­ed and unlawful access to vehicle systems.

‘We appreciate the contributi­ons of cybersecur­ity advocates to augment the industry’s understand­ing of potential vulnerabil­ities. however, we caution advocates that in the pursuit of improved public safety they [do] not, in fact, compromise public safety.’ In the

The driver pleaded with the hackers: ‘Make it stop!’ A teenager took control of a car with his iPhone

U.S., two senators are set to introduce an automotive security Bill that would set digital security standards for cars and lorries.

There have also been calls for Congress to pass laws insisting car manufactur­ers adopt the tightest cyber-security measures possible.

Some progress is being made, with the House Committee on Energy and Commerce questionin­g all major car makers to see what they are doing to thwart hackers.

In this country, the issue was addressed in a speech last year by the Home Secretary Theresa May. ‘We can now work with industry to improve electronic resilience to include this kind of resilience in the vehicle’s overall security ratings and work out the extent to which the same threat applies to other physical assets such as building security systems,’ she said.

Many British car manufactur­ers, such as Ford, say they are taking the issue ‘very seriously’ and doing all they can to ensure that new cars are as hack-proof as possible. Of course, we only have their word for it.

The problem is that no system can be completely secure. And with consumers demanding ever more complex gadgetry, such as touchscree­n web browsers, the security risk is further increased. ‘Once you add a web browser to a car, it’s over,’ Charlie Miller said recently, pointing out that many people know how to hack into a web browser.

In the future, it is likely that car makers will introduce vehicle-to-vehicle (V2V) communicat­ion, in which our cars would be able to talk to each other electronic­ally, sending warnings of an accident or a build-up of traffic.

Some developers envisage that our cars will be slowed down automatica­lly when danger is ahead or even re-routed to avoid traffic. This means they will need to be connected to the internet all the time, which in turn will make them even more accessible to hackers.

Unfortunat­ely, there is little we drivers can do to protect ourselves from remote hacking. Some people might be able to spot an unexpected electronic gizmo, but most of us barely look under the bonnet, let alone investigat­e the wiring.

All we can do is ensure that the Government keeps pressing car manufactur­ers to make their vehicles as safe as possible. It’s either that or buy an old banger.

 ?? Picture: GETTY ??
Picture: GETTY
 ??  ??

Newspapers in English

Newspapers from United Kingdom