Posted on 09/20/2016 4:44:34 PM PDT by MarchonDC09122009
Hacking News - Tesla model S hacked from 12 miles away | MalwareTips.com
https://malwaretips.com/threads/tesla-model-s-hacked-from-12-miles-away.63609/
Tesla model S hacked from 12 miles away
Source: http://news.softpedia.com/news/tesla-model-s-hacked-from-12-miles-away-508468.shtml
Security experts from Chinese security firm Tencent Keen Security Lab have hacked a Tesla Model S from afar, taking control over a variety of car functions, including its ability to break.
The research team revealed its findings on the company's blog yesterday, accompanied by a video demonstration. They also notified Tesla in advance, via the company's bug bounty program, and the automaker has addressed all issues via a firmware update to its cars.
Researchers achieved this level of access by chaining different vulnerabilities together that allowed them to interact with the car's CAN Bus, the vehicle's central management component.Hacks work on stationary and moving vehicles alikeThe hacks work even from remote locations, as far as 12 miles (20 km) away. The Chinese hackers were able to control a stationary car's lights, windows, car seats, sunroof panel, and in-vehicle displays.
With the car in motion, the researchers were able to force the car to brake, open its trunk, adjust side-view mirrors, and activate the windshield wipers.
Researchers hacked a Tesla Model S 75D, but they said other models could be vulnerable as well.
"As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars," researchers said. "We have verified the attack vector on multiple varieties of Tesla Model S. It is reasonable to assume that other Tesla models are affected."Tesla addressed all issues via a firmware updateTesla delivers over-the-air firmware updates, and as long as vehicle owners agreed to update their car's software, they should be protected from any attacks.
Last year, Kevin Mahaffey, co-founder of cyber-security firm Lookout, and Marc Rogers, security researcher at CloudFare,also managed to hack a Tesla Model S, via its infotainment system and forced it to stop in mid-drive.
If the SHTF, I know which one you’ll be driving
Assuming any of them run in the first place.
I’ve never seen a CJ6 in real life, only pictures.
That is a sharp looking Bronco II. I’d love diesel power.
That is true, I removed my bronco computer and all the electronics from my Bronco to make it EMP proof when I converted to the diesel. Only component that would fail is the alarm system but I can bypass that easily and keep going.
Virtually every vehicle since 2008 uses CAN bus networks as do many older ones. Only a fraction connect that network to any kind of wireless communication device. None should. The normal way to interface with the CAN network is by plugging a cable into the OBD-II connector under the dash.
Thanks I did ALL the work myself, it took some time and effort but mine is the only one like it that I know of.
Keep a spare couple of the modules in a grounded simple Faraday.
I wished I had the facilities and resources to pull off something even half of that.
I can’t ever recall of even hearing of something built like yours and I grew up around plenty of backyard mechanics, hot rodders, and builders. Some of it rubbed off on me at least.
I’m at the point where I will have to farm out some of the big jobs on my ragged old jeeps to a shop. Being limited to a carport and some minor health problems, some stuff isn’t practical now.
http://s1381.photobucket.com/user/Todd4077/library/?sort=3&page=2
I love those old jeeps ! They are a blast to drive and you can go anywhere ! People snatch those things up quick if you ever try to sell them. I hear ya, I am 56 and got a lot of bruised knuckles doing all that work, I’m gonna drive my bronco ii till I die :)
You are fully correct and knowledgeable.
The Auto industry consortium, NIST Gov’t, and infosec orgs are establishing security standards, practices to assure vehicle safety and privacy.
For instance NIST-GTO69 standards recommend application of dark 3M window tint film to assure occupant privacy for back seat sex acts and driver seat auto-stimulation.
;n)
Seriously though -
Automotive Cybersecurity Best Practices Executive ... - Auto ISAC
https://www.automotiveisac.com/assets/img/executive-s... Proxy Highlight
Jul 21, 2016 ... The Best Practices focus on product cybersecurity within the motor vehicle ... Institute of Standards and Technology (NIST), International ...
Framework for Automotive Cybersecurity Best Practices - Alliance of ...
www.autoalliance.org/index.cfm?objectid=1E518FB0-BEC3... Proxy Highlight
identify industry best practices for vehicle cybersecurity. ... Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity2 , SAE.
Cyber Ratings for the Auto Industry: Summary of Key Issues
csrc.nist.gov/groups/SMA/ispab/documents/minutes/2016... Proxy Highlight
1) Can cyber vulnerabilities in automobiles be exploited to cause harm to drivers ? ... NHTSA Automotive Cybersecurity Research Program. Industry and ...
NHTSA - NIST Computer Security Resource Center - National ...
csrc.nist.gov/groups/SMA/ispab/documents/minutes/2015... Proxy Highlight
National Highway Traffic Safety Administration. NHTSA and Automotive. Cybersecurity. Briefing to the Information Security and. Privacy Advisory Board. October ...
Auto Industry ISAC Releases Best Practices For Connected Vehicle ...
www.darkreading.com/vulnerabilities-—threats/auto-in... Proxy Highlight
Jul 21, 2016 ... In each case the guidance has been adapted for the car industry from established cybersecurity standards like NIST’s cybersecurity framework ...
RE: “Virtually every vehicle since 2008 uses CAN bus networks as do many older ones. Only a fraction connect that network to any kind of wireless communication device. None should. The normal way to interface with the CAN network is by plugging a cable into the OBD-II connector under the dash.”
Nice ride!!! Had a 4wd Bronco II years ago, not quite like your diesel..
Even at $70 a pop, I may go ahead and do it.
I won’t buy a car that has so much as a key with a chip in it. Actually I won’t buy a car manufactured after about 1996.
Electronic controls are open to hacking and someone else driving your car with you trying to drive it yourself. Consider the Toyotas that are totally drive-by-wire. A determined wargaming 12 year old could probably take it over remotely and surely could if he had a chance to plug in a USB or something else into the car’s system.
96 Cavalier here.
On that Camry the steering wheel is no more than a rheostat. I worry about those things. What happens if the electric system fails? Nothing then can work, no?
1996 was the first year that they standardized on the OBD-II computer hookup , but even then most of it is diagnostic sensors. I know people who love their Cavaliers. I need/want more room, but you’ll go farther on a gallon, I’m sure.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.