Security Short Take: Hackers remotely take control of Jeep

Incident shows risk of cyberattack through car's Internet access

Two hackers successfully gained access to a Jeep Cherokee recently and were able to take control of the car's radio and windshield wipers and eventually shut the car down.

Drivers need not panic though, the hackers were security experts who took a year to figure out how break into the car's computer systems. Still, they warn that such an act could occur on hundreds of thousands of cars on the road today.

The car was being driven by Andy Greenberg, a writer for the online magazine Wired, which collaborated with the two security experts to show how they could wirelessly take control of the 2015 model's vital functions from 10 miles away.

The two hackers, Charlie Miller a former NSA hacker and security researcher for Twitter, and Chris Valasek, research director at the security consulting firm IOActive, informed Chrysler of the vulnerability so the auto maker could patch the flaw.

The hackers gained access to the car through a cellular network connection to the Jeep's infotainment system while Greenberg was driving on a highway in St. Louis.

Miller and Valasek found a remote vulnerability in Chevrolet's UConnect telematics system. From there, they were able to gain access to the car's other computer systems through an Internet connection over Sprint's cellular network. (Car makers often collect data on vehicles through cellular networks to inform drivers of the need for maintenance or repairs.)

"We gained access by exploiting a vulnerability that was present on the head unit (i.e. the radio/navigation thingie) that was accessible over the Internet, Miller said. "It did not require any physical access or changes to the vehicle."

While the flaw that led to the hack is found only in the Chrysler UConnect head unit, there are probably similar types of security vulnerabilities in other car maker's telematics systems, Miller said.

While the hack of a running car on a highway is alarming, there are steps that can be taken, and are under way, to make cars more secure:

  1. Auto makers need to isolate a car's driving functions from infotainment systems;
  2. Auto makers could upgrade software to detect malicious messages and order critical vehicle systems, such as brakes, to ignore them;
  3. There's an effort in Congress to require auto makers to install technology that protects drivers against vehicle cyberattacks.

The ideal solution, Miller said, is an intrusion detection system for the car that can detect, report and stop hacking attempts in real time.

On a more positive note, these types of attacks from malicious hackers are unlikely because there is little to gain financially and the hacks take a lot of work.

With reports by Lucas Mearian at Computerworld.

Join the CSO newsletter!

Error: Please check your email address.

Tags securityChrysler

More about CherokeeNSASprintTwitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Marian Prokop

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place