US getting paranoid about car hacking

FILE - In this Feb. 9, 2010 file photo, master diagnostic technician Kurt Juergens, of Foxborough, Mass., uses a laptop computer to diagnose and repair the brake system on a 2010 Toyota Prius in the repair shop of a Toyota dealership, in Norwood, Mass. A pair of hackers maneuvered their way into the computer systems of a 2010 Toyota Prius and 2010 Ford Escape through a port used by mechanics. The hackers showed that they could slam on the brakes at freeway speeds, jerk the steering wheel or even shut down the engine, all from their laptop computers. The work demonstrates vulnerabilities with the growing number of car computers, about 20 on older models and up to 70 on sophisticated luxury cars. (AP Photo/Steven Senne, File)

FILE - In this Feb. 9, 2010 file photo, master diagnostic technician Kurt Juergens, of Foxborough, Mass., uses a laptop computer to diagnose and repair the brake system on a 2010 Toyota Prius in the repair shop of a Toyota dealership, in Norwood, Mass. A pair of hackers maneuvered their way into the computer systems of a 2010 Toyota Prius and 2010 Ford Escape through a port used by mechanics. The hackers showed that they could slam on the brakes at freeway speeds, jerk the steering wheel or even shut down the engine, all from their laptop computers. The work demonstrates vulnerabilities with the growing number of car computers, about 20 on older models and up to 70 on sophisticated luxury cars. (AP Photo/Steven Senne, File)

Published Dec 4, 2013

Share

Boston - A US senator has asked 20 of the world's biggest car companies for information on how they secure their vehicles from cyber attacks, in light of reports by security experts who say they have identified ways to hack into cars.

Edward Markey, a Democrat from Massachusetts, asked the companies to respond to a series of questions including how they test electronic components and wireless networks to make sure that attackers cannot gain access to onboard networks. He cited recent research by security experts who uncovered cyber vulnerabilities in cars that they said hackers might be able to exploit to cause them to crash.

The letter, dated Monday, also asked about measures the carmakers take to ensure the privacy of information collected by automobile computer systems.

“As vehicles become more integrated with wireless technology, there are more avenues through which a hacker could introduce malicious code and more avenues through which a driver's basic right to privacy could be compromised,” Markey said in the letter.

“These threats demonstrate the need for robust vehicle security policies to ensure the safety and privacy of our nation's drivers,” he added.

Recipients of the letter included BMW, Chrysler, Ford, GM, Mazda, Toyota and Volkswagen.

The Auto Alliance, an industry group whose members include those seven companies, released a statement on Tuesday saying that carmakers were reviewing the letter.

SECURITY’S A PRIORITY FOR CARMAKERS

“Auto engineers are incorporating security solutions into vehicles from the first stages of design and production, and their security testing never stops,” the group said in the statement. “Vehicle hardware has built-in security features that help protect safety critical systems, and auto control systems are isolated from communications-based functions like navigation and satellite radio.”

Concerns that hackers could attack cars with potentially lethal results have been growing for several years.

A group of US computer scientists startled the industry in 2010 with research showing that viruses could take control of computers running car brakes, lights, locks and other systems. A year later the same researchers identified ways to remotely infect cars over Bluetooth and other wireless systems.

They kept the details of their work a closely guarded secret, declining to identify the manufacturer of the car they studied.

The National Highway Traffic Safety Administration responded by beginning an auto cybersecurity research programme.

“While increased use of electronic controls and connectivity is enhancing transportation safety and efficiency, it brings a new challenge of safeguarding against potential vulnerabilities,” the agency said in a statement on Tuesday. “NHTSA recognizes these new challenges but is not aware of any consumer incidents where any vehicle control system has been hacked.”

Researchers have recently begun going public with details about vulnerabilities in automobiles in a bid to pressure manufacturers to boost security.

VULNERABILITY STILL EXISTS

This past summer at the Defcon hacking conference in Las Vegas, security experts from the United States and Europe released detailed research describing cyber vulnerabilities in car models from at least three manufacturers.

The letter from Markey cited one of those presentations in his letter, a study by researchers Charlie Miller and Chris Valasek that was funded by the Pentagon's Defense Advanced Research Projects Agency.

The two released a 100-page White Paper detailing their findings, which included ways to force a Toyota Prius to brake suddenly at 128km/h, jerk its steering wheel, or accelerate the engine. They also described a method for disabling the brakes of a Ford Escape traveling at very slow speeds, so that the car keeps moving no matter how hard the driver presses the pedal.

Markey said he believed that automakers had played down the severity of its findings.

Stuart McClure, chief executive of Cylance Inc and an expert on vehicle security, said that while onboard computer systems are vulnerable to hacking, they do not yet present much risk to the average driver. Such attacks are far more cumbersome to engineer than ones on PCs, he said.

But he said that the government ought to look into how carmakers secure data that customers provide them when obtaining leases and loans.

“If I want to get a whole bunch of social security numbers and private data, I'm going to hack into their corporate servers and gain access to the data belonging to the millions of people who ever got a car from them,” he said. -Reuters

Related Topics: