By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    How to Fight Rootkits -Kaspersky Daily
    1 year ago
    Faketoken Banking Trojan is Getting Widespread in 55 Countries
    1 year ago
    Explaining what exploits are and why they are so scary
    1 year ago
    Latest News
    PDF Phishing: Beyond the Bait
    28 mins ago
    Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
    3 hours ago
    Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
    21 hours ago
    Patchstack Alliance Bounty Program Events for December
    3 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Unscheduled update for WordPress fixes two critical vulnerabilities
    Unscheduled update for WordPress fixes two critical vulnerabilities
    1 year ago
    Windows 11 build 22621.457 (KB5016695) outs in Release Preview Channel
    1 year ago
    How to change time zone on Windows 11
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    A year in recap: Windows accessibility
    3 hours ago
    How to stop, disable, and remove any Android apps — even system ones
    2 days ago
    Bigger, Better, Cooler in a 2U1N form factor
    Bigger, Better, Cooler in a 2U1N form factor
    3 days ago
    Vulnerability in crypto wallets created online in the early 2010s
    4 days ago
    Use Windows 11 features to inspire creativity, speed up everyday tasks
    5 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    The Russian division of the PlayStation changed the negative review of the game to positive
    1 year ago
    Why pay attention to DuckDuckGo?
    1 year ago
    Huawei employees fined for tweeting from iPhone
    1 year ago
    Latest News
    How to disable news feed from Widgets on Windows 11
    1 hour ago
    How to fix performance issues after upgrading to Windows 11 23H2
    1 hour ago
    How to disable updates on Windows 10 Pro and Home
    1 day ago
    Change screen brightness on Windows 11
    3 days ago
  • Glossary
  • My Bookmarks
Reading: Black Hat USA 2015: The full story of how that Jeep was hacked
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

Black Hat USA 2015: The full story of how that Jeep was hacked

Vitus White
Last updated: 7 October
Vitus White 9 years ago
Share
9 Min Read

Recently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail, how exactly that hack happened.

At the start of their research Miller and Valasek tried to hack the multimedia system of Jeep through Wi-Fi connection — Chrysler, the manufacturer of the vehicle, offers this option by subscription. It turned out, that it isn’t that hard to hack this Wi-Fi due to the fact that the Wi-Fi password is generated automatically, based on the time when the car and it’s multimedia system — the head unit — is turned on for the very first time.

In theory, considering the second precision of the date/time, it’s a rather secure method which gets you lots of possible combinations. But if you know the year when the car in question was manufactured and if you successfully guess the month you can bring the count down to just 15 million combinations. If you suppose the time was during the day, it gets you to about 7 million combinations. For a hacker, this number is pretty workable — you can brute force it within an hour.

Shock at the wheel: your Jeep can be hacked while driving down the road https://t.co/40h8StaLFG pic.twitter.com/bOvjzQb9K4

— Kaspersky Lab (@kaspersky) July 23, 2015

The problem is, that you need to follow that very Jeep for that hour to stay in touch with its Wi-Fi connection. The researchers tried to find another way. And — surprise, surprise! — they found one: it turned out, that the Wi-Fi password for Chrysler’s cars is generated before the actual time and date is set and is based on default system time plus a few seconds during which the head unit boots up.

So the January 01 2013 00.00 GMT it was, or more precisely 00.00.32 GMT in this very case. The number of combinations is very small, and it’s a piece of cake even for amateur hacker to guess the right one.

Black Hat USA 2015: The full story of how that Jeep was hacked

After connecting to the Jeep’s head unit, Miller and Valasek were able to find a possible way to hack the multimedia computer, which runs on a Linux operating system. Exploiting some pretty guessable issues in the software, they finally took control over the head unit’s system.

Possibilities of this hack are limited, but quite impressive: researchers were able to completely control the music player, set the radio to whatever station they wanted and its volume to any level. Imagine what can happen if someone is driving on 70 mph speed and suddenly his music changes to loud static.

Another possibility researchers found is to track the car with its GPS navigational system. To exploit this possibility you even don’t need to change the head unit’s software, it’s a built-in option.

Black Hat USA 2015: The full story of how that Jeep was hacked

This is how to hack Wi-Fi connection of the Chrysler’s car if its owner is paying for the subscription. But currently there are not a lot of people who pay for this service. On the other hand, all of the head units are connected to Sprint cellular network, even if their owners have not purchased any wireless service. It’s just a standard for the automobile’s type of head units.

Miller and Valasek tried to exploit this way — it took a lot of time and efforts, but these efforts weren’t fruitless. With help of ‘femtocell’ (compact cellular base station) which they bought on eBay, they were able to get into Sprint internal network and manage a mass scan of IP addresses listening to the certain calls they already knew about after hacking through Wi-Fi.

Recall Alert: Fiat Chrysler is recalling 1.4 million hackable vehicles. Check affected cars: http://t.co/sErJGgCxqL pic.twitter.com/8HuTxKYIY0

— CNNMoney (@CNNMoney) July 25, 2015

Employing this trick you can find all of Chrysler’s cars equipped with this kind of head unit. Over a million of them were actually recalled by Fiat Chrysler. After that all you need is to choose the right one. Funny thing is that it’s rather hard to do, “it’s much easier to hack all the Jeeps than the certain one,” as the researchers say.

However, picking the wanted Jeep is doable as well, thanks to the option of the GPS tracker. After that you can make all the tricks with multimedia system you want. But this is not the end though.

The next step was to find a way to access CAN bus. This bus is a vehicle’s internal network, which interconnects all of the vehicle most important components — engine, transmission, sensors and so on and so forth, almost everything you have onboard, since almost every part of the vehicle is electronically controlled nowadays.

#BlackHat USA 2015: The full story of how that #Jeep was hacked

Tweet

The multimedia system is not connected to CAN bus directly. This is the thing that all the manufacturers always refer back to when it comes to IT-security of cyber-physical systems: there is an isolation they say, the air gap between connected and physical parts of these systems.

As it turned out, this air gap is not that thick, at least in Chrysler’s cars. Despite the fact that multimedia system’s controller itself can’t communicate directly with CAN bus, it actually can communicate with another component which is connected to CAN bus, the V850 controller. He knows a guy, who knows a guy situation, simply put.

The V850 controller’s software was designed in some cautious way, making it possible to listen to CAN bus, but not to send commands over it. But you know, it’s a computer after all. And if there’s no capability you need out-of-the-box, you can simply add one by reprogramming the computer.

Black Hat USA 2015: The full story of how that Jeep was hacked

Researchers discovered an opportunity to change firmware of the V850 controller for their maliciously crafted version through the connection to multimedia system’s controller. This firmware ‘upgrade’ can be done without any checks or authorizations. Even if there was authorization, researchers have found a couple of vulnerabilities that make possible taking control over this V850 controller.

And that was it: after this move Miller and Valasek were able to send commands through the CAN bus and make every — every! — component of the car to do whatever they wanted. They were able to control steering wheel, engine, transmission, braking system, not to mention dull things like windscreen wiper, air conditioner, door locks and so on. Moreover, they were able to control all this things completely remotely, over the Sprint cellular network.

Thanks to everyone who came to our talk. I know there were lots of other cool talks at the same time. pic.twitter.com/2RSLHKYJuK

— Charlie Miller (@0xcharlie) August 6, 2015

The good news is that it took years for Miller and Valasek to make their research. And the main trick — learning how to manage CAN bus connected components of the car — still stays unexplained by them. It’s not like everyone can do all the stuff, that the researchers have done. The bad news is that impressive hacks like this one are pretty possible. And the impact is hard to overestimate.

Update: 10 August 2015 Valasek and Miller published their research via whitepaper


Source: kaspersky.com

Translate this article

TAGGED: Linux, Security, Software, Threats, Vulnerabilities
Vitus White October 7, 2022 April 1, 2015
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

PDF Phishing: Beyond the Bait
Threats 3 hours ago
A year in recap: Windows accessibility
Windows 3 hours ago
How to disable news feed from Widgets on Windows 11
News 4 hours ago
How to fix performance issues after upgrading to Windows 11 23H2
News 4 hours ago
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Wordpress Threats 6 hours ago

You Might Also Like

Threats

PDF Phishing: Beyond the Bait

3 hours ago
News

How to fix performance issues after upgrading to Windows 11 23H2

4 hours ago
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Wordpress Threats

Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution

6 hours ago
Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
Wordpress Threats

Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware

1 day ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
How to disable updates on Windows 10 Pro and Home
How to stop, disable, and remove any Android apps — even system ones
Patchstack Alliance Bounty Program Events for December
Your Smart Coffee Maker is Brewing Up Trouble
Bigger, Better, Cooler in a 2U1N form factor
Previous Next
Hot News
PDF Phishing: Beyond the Bait
A year in recap: Windows accessibility
How to disable news feed from Widgets on Windows 11
How to fix performance issues after upgrading to Windows 11 23H2
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?