Security

Hacking train Wi-Fi may expose passenger data and control systems

Researcher finds security hotspots on some rail networks


Vulnerabilities on the Wi-Fi networks of a number of rail operators could expose customers' credit card information, according to infosec biz Pen Test Partners this week.

The research was conducted over several years, said Pen Test's Ken Munro. "In most cases they are pretty secure, although whether the Wi-Fi works or not is another matter," he added.

But in a handful of cases Munro was able to bridge the wireless network to the wired network and find a database server containing default credentials, enabling him to access the credit card data of customers paying for the Wi-Fi, including the passenger's name, email address and card details.

He said he was not aware of any incidents of networks being compromised but warned in the worst-case scenario it might be possible for miscreants to take control of the train. "It might be possible, and this is speculation, to lock the braking system."

Munro refused to name the operators affected by the weak security set-up - the vulnerabilities still exist.

The security hole could be prevented by increasing the complexity of login credentials, which often haven't been changed from the default or are too simple.

Lateral thinking, lateral network movement

Munro said weak credentials mean a hacker can also change the routing, potentially allowing them access to more sensitive networks on the train.

Part of the problem is a lack of segregation between the Wi-Fi networks. This could be solved by ensuring passengers can only route traffic from their devices to the internet. The wireless router admin interface should not be accessible to passengers either.

Operators must also check that the admin interface cannot be accessed, which is often available on the gateway IP address. Completely isolated, physically separate hardware for passenger Wi-Fi is preferable.

A separate survey recently found that the majority of consumers are potentially leaving themselves exposed to miscreants by failing to change the password and security setting on their routers.

Infosec bods noted that if an attacker could access the admin interface, they could probably log in by guessing the default password and then change settings, including the Wi-Fi password itself. ®

Send us news
62 Comments

Microsoft squashes SmartScreen security bypass bug exploited in the wild

Plus: Adobe, SAP, Fortinet, VMware, Cisco issue pressing updates

Cisco creates architecture to improve security and sell you new switches

Hypershield detects bad behavior and automagically reconfigures networks to snuff out threats

OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories

While some other LLMs appear to flat-out suck

Japanese government rejects Yahoo<i>!</i> infosec improvement plan

Just doesn't believe it will sort out the mess that saw data leak from LINE messaging app

US government excoriates Microsoft for 'avoidable errors' but keeps paying for its products

In what other sphere does a bad supplier not feel pain for its foulups?

Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims

'I want to buy a car. That's all'

Ransomware feared as IT 'issues' force Octapharma Plasma to close 150+ centers

Source blames BlackSuit infection – as separately ISP Frontier confirms cyberattack

Fire in the Cisco! Networking giant's Duo MFA message logs stolen in phish attack

Also warns of brute force attacks targeting its own VPNs, Check Point, Fortinet, SonicWall and more

Zero-day exploited right now in Palo Alto Networks' GlobalProtect gateways

Out of the PAN-OS and into the firewall, a Python backdoor this way comes

French issue <em>alerte rouge</em> after local governments knocked offline by cyber attack

Embarrassing, as its officials are in the US to discuss Olympics cyber threats

It's 2024 and Intel silicon is still haunted by data-spilling Spectre

Go, go InSpectre Gadget

Old Windows print spooler bug is latest target of Russia's Fancy Bear gang

Putin's pals use 'GooseEgg' malware to launch attacks you can defeat with patches or deletion