On Car Hacking Attacks

Sunday, September 04, 2011

Theresa Payton

D13f77e036666dbd8f93bf5895f47703

Taken from: WBTV’s segment with Kristin Miranda, Protecting Your Cyberturf

There is nothing like a nice sunny day driving around town in your car, listening to your favorite music. But did you know that depending upon how you get your music, you might make your home computer vulnerable to hackers and also your car?

We have warned you before about being careful what you download to your computer. We have even warned you before that cyberhackers might be able to take over your car’s Bluetooth.

Just when you think you have heard it all, now savvy hackers can hack into your car a different way, through your favorite tunes. WBTV’s Cyber Expert Theresa Payton explains how they do it and how to avoid the car hack hijack.

HOW IT WORKS:

  • Researchers were able to add an extra code to a digital music file.
  • They burned the music file, with the extra code, to a CD.
  • The CD was played in the car. By playing the music, it gave them access to alter the car’s stereo system to receive instructions.
  • From the altered system, they could communicate with other car components such as unlocking your doors or killing the engine.
NOTE: This method can also be used to infect your home computer so always make sure you only download music from legitimate music sharing sites.

THREE QUICK TIPS TO PROTECT YOUR CAR AND COMPUTERS:

  • Talk to your kids to make sure they understand to only download songs from legitimate sites.
  • Only download songs from legitimate sites such as iTunes.com or Amazon.com
  • If you suspect you might have an infected song, delete the song from all of your devices and throw away all the CDs that you have made.
There are many legitimate music sites. We have included two for you:

You can read more about what the researchers found when they tried to hack a car at The National Academies site: http://www8.nationalacademies.org/cp/committeeview.aspx?key=49236

Cross-posted from Fortalice

 

Help Support Infosec Island by Tweeting and Stumbling our Articles - Thanks!

Possibly Related Articles:
18582
Webappsec->General
Information Security
Bluetooth Hacking Vulnerabilities Attacks Download Cars
Post Rating I Like this!
Default-avatar
Roshan Jadhav I think automobile industry is aware about this kind of risks and they are working on the defenses against threats.
http://www.usedcars.indiandrives.com
1336208357
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.