Feeds

Watch this Aussie infosec bod open car doors from afar

Homes unlocked now car doors popped

Secure remote control for conventional and virtual desktops

Silvio Cesare

Silvio Cesare has probably spent enough on home alarm systems at hardware stores to buy a small pacific island. The Canberra hacker has over the last three years embarrassed manufacturers by buying remote alarms, baby monitors and locks from eBay and hardware stores and later developing replay attacks that allow attackers to switch them off.

The newly minted director of anti-malware engineering at Qualys was now set to present his research into opening car doors and boots at Black Hat Las Vegas as part of his new field of interest.

Cesare @silviocesare opened the doors and boot of his 10 year old car over about two hours by capturing and replaying the signals produced from the vehicles' remote key fob with about $1000 worth of equipment.

By contrast, he hacked home alarms with arduino-based kit that cost less than US$50.

While he wasn't revealing the make and model of his car used in the test, he says the attacks would likely work on other older model vehicles.

Silvio Cesare

Silvio Cesare

Worse, he said some cars appear to have a consistent code in the wireless transmission - a backdoor if you will - that would consistently open cars. That backdoor opened his car for a week before it oddly stopped working. He planned more work into the backdoor and thought it was likely specific to car models.

"Once known, unlocking car takes seconds not hours," Cesare said.

Prolific car hackers Charlie Miller (@0xcharlie) of Twitter and Chris Valasek (@nudehaberdasher) of IOActive round out the Black Hat vehicle hacker fest.

They have popped this year's Jeep Cherokee, Infiniti Q50 and the 2015 Escalade due to the large amount of features located on the same network as the main controls such as brakes and steering, the researchers told Dark Reading. The most secure late model cars was this year's Dodge Viper, Audi A8, and Honda Accord because the vehicles had separated networks.

Car hacking research has come thick and fast in recent years, prompting the US Association of Global Automakers to implement an intelligence sharing forum to help squash vulnerabilities.

Spooked drivers could do little else than buying an aftermarket keyless entry device -- or a new car -- since recalls were not feasible. Cesare recommended those buying home wireless alarm systems avoid cheap offerings at K-Mart, Big W and Bunnings, since virtually all of them could be broken, and instead invest in commercial systems that use rolling codes.

"Needless to say, newer cars have stronger security, so upgrading the car is also an option," he said.

"For car makers, a PRNG (pseudo random number generator) could be replaced with a list of codes stored in flash memory that is generated by a true random number generator. Also, obviously, avoid coding in backdoors."

Cesare would now work on silicon-level analysis after he decapsulated the integrated circuits in the car's keyfob which may help recover firmware and the algorithm needed to generate backdoors.

More information about Cesare's car and alarm hacking antics was available in his paper Breaking the secuity of physical devices ®.

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.