Feeds

Watch this Aussie infosec bod open car doors from afar

Homes unlocked now car doors popped

Internet Security Threat Report 2014

Silvio Cesare

Silvio Cesare has probably spent enough on home alarm systems at hardware stores to buy a small pacific island. The Canberra hacker has over the last three years embarrassed manufacturers by buying remote alarms, baby monitors and locks from eBay and hardware stores and later developing replay attacks that allow attackers to switch them off.

The newly minted director of anti-malware engineering at Qualys was now set to present his research into opening car doors and boots at Black Hat Las Vegas as part of his new field of interest.

Cesare @silviocesare opened the doors and boot of his 10 year old car over about two hours by capturing and replaying the signals produced from the vehicles' remote key fob with about $1000 worth of equipment.

By contrast, he hacked home alarms with arduino-based kit that cost less than US$50.

While he wasn't revealing the make and model of his car used in the test, he says the attacks would likely work on other older model vehicles.

Silvio Cesare

Silvio Cesare

Worse, he said some cars appear to have a consistent code in the wireless transmission - a backdoor if you will - that would consistently open cars. That backdoor opened his car for a week before it oddly stopped working. He planned more work into the backdoor and thought it was likely specific to car models.

"Once known, unlocking car takes seconds not hours," Cesare said.

Prolific car hackers Charlie Miller (@0xcharlie) of Twitter and Chris Valasek (@nudehaberdasher) of IOActive round out the Black Hat vehicle hacker fest.

They have popped this year's Jeep Cherokee, Infiniti Q50 and the 2015 Escalade due to the large amount of features located on the same network as the main controls such as brakes and steering, the researchers told Dark Reading. The most secure late model cars was this year's Dodge Viper, Audi A8, and Honda Accord because the vehicles had separated networks.

Car hacking research has come thick and fast in recent years, prompting the US Association of Global Automakers to implement an intelligence sharing forum to help squash vulnerabilities.

Spooked drivers could do little else than buying an aftermarket keyless entry device -- or a new car -- since recalls were not feasible. Cesare recommended those buying home wireless alarm systems avoid cheap offerings at K-Mart, Big W and Bunnings, since virtually all of them could be broken, and instead invest in commercial systems that use rolling codes.

"Needless to say, newer cars have stronger security, so upgrading the car is also an option," he said.

"For car makers, a PRNG (pseudo random number generator) could be replaced with a list of codes stored in flash memory that is generated by a true random number generator. Also, obviously, avoid coding in backdoors."

Cesare would now work on silicon-level analysis after he decapsulated the integrated circuits in the car's keyfob which may help recover firmware and the algorithm needed to generate backdoors.

More information about Cesare's car and alarm hacking antics was available in his paper Breaking the secuity of physical devices ®.

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.