Watch this Aussie infosec bod open car doors from afar
Homes unlocked now car doors popped
Silvio Cesare has probably spent enough on home alarm systems at hardware stores to buy a small pacific island. The Canberra hacker has over the last three years embarrassed manufacturers by buying remote alarms, baby monitors and locks from eBay and hardware stores and later developing replay attacks that allow attackers to switch them off.
The newly minted director of anti-malware engineering at Qualys was now set to present his research into opening car doors and boots at Black Hat Las Vegas as part of his new field of interest.
Cesare @silviocesare opened the doors and boot of his 10 year old car over about two hours by capturing and replaying the signals produced from the vehicles' remote key fob with about $1000 worth of equipment.
By contrast, he hacked home alarms with arduino-based kit that cost less than US$50.
While he wasn't revealing the make and model of his car used in the test, he says the attacks would likely work on other older model vehicles.
Worse, he said some cars appear to have a consistent code in the wireless transmission - a backdoor if you will - that would consistently open cars. That backdoor opened his car for a week before it oddly stopped working. He planned more work into the backdoor and thought it was likely specific to car models.
"Once known, unlocking car takes seconds not hours," Cesare said.
They have popped this year's Jeep Cherokee, Infiniti Q50 and the 2015 Escalade due to the large amount of features located on the same network as the main controls such as brakes and steering, the researchers told Dark Reading. The most secure late model cars was this year's Dodge Viper, Audi A8, and Honda Accord because the vehicles had separated networks.
Car hacking research has come thick and fast in recent years, prompting the US Association of Global Automakers to implement an intelligence sharing forum to help squash vulnerabilities.
Spooked drivers could do little else than buying an aftermarket keyless entry device -- or a new car -- since recalls were not feasible. Cesare recommended those buying home wireless alarm systems avoid cheap offerings at K-Mart, Big W and Bunnings, since virtually all of them could be broken, and instead invest in commercial systems that use rolling codes.
"Needless to say, newer cars have stronger security, so upgrading the car is also an option," he said.
"For car makers, a PRNG (pseudo random number generator) could be replaced with a list of codes stored in flash memory that is generated by a true random number generator. Also, obviously, avoid coding in backdoors."
Cesare would now work on silicon-level analysis after he decapsulated the integrated circuits in the car's keyfob which may help recover firmware and the algorithm needed to generate backdoors.
More information about Cesare's car and alarm hacking antics was available in his paper Breaking the secuity of physical devices ®.
Sponsored: 2016 Cyberthreat defense report