The Growing Threat of Car Hacking | Mandiant | Fireeye
Total Page:16
File Type:pdf, Size:1020Kb
FireEye iSIGHT Intelligence CONNECTED CARS: THE OPEN ROAD FOR HACKERS SPECIAL REPORT / JUNE 2016 WI-FI INTERNET ACCESS Wireless access points frequently featured in new vehicles raise the potential for abuse if they are VEHICLE-TO-VEHICLE COMMUNICATIONS poorly secured and connected to Commonly referred to as V2V, vehicles will increasingly the vehicle’s other systems. Ever- communicate with one another autonomously in order to assist with increasing bandwidth capabilities vehicle spacing and lane changing, while using other data that can potentially increase the damage a improve vehicle operation.1 Eventually, vehicle-to-infrastructure (V2I) malicious actor could cause. will allow vehicles to communicate with traffic signals and road INTRODUCTION signs in order to better manage traffic flow and share data on road usage. Manipulating driver assist systems that use V2V or V2I could undermine safety and potentially cause collisions. THE ACCELERATION OF THE “INTERNET OF THINGS” (IOT) VEHICLE REVOLUTION HAS INCREASED SYSTEMS THE CONNECTIVITY OF EXTERIOR PASSENGER VEHICLES, WHICH IS LIKELY TO IMPACT AVERAGE CONSUMERS SIGNIFICANTLY. Today, most vehicle functions – steering, acceleration, braking, remote start, and even unlocking the doors – are controlled by software that accepts commands from a diverse array of digital systems operating both inside and outside the vehicle. However, this software contains millions of lines of code, and in these lines of code there may be vulnerabilities that can be exploited by individuals with malicious intent. FireEye iSIGHT Intelligence analysts and Mandiant consultants reviewed the key threats to interior and exterior vehicle systems and assessed the top five threats created by vehicle software vulnerabilities. These include: COLLISION AVOIDANCE Braking assist systems often use radar or other sensors to detect an imminent crash. A compromised vehicle could send manipulated Unauthorized physical Theft of personally Deliberate manipulation Hijacking vehicle systems Extortion enabled by data to the ECUs that control this feature, access to vehicles identifiable information of vehicle operation to enable malicious cyber ransomware that renders either causing it to fail to engage or engage TIRE PRESSURE MONITORING SYSTEM (TPMS) from manufacturer or activity vehicles inoperable until Systems that monitor tire pressure frequently third-party storage a ransom is paid braking unexpectedly, leading to a forced stop systems or passenger injury. communicate over a short-range wireless connection that could be used as an infection vector for vehicle- specific malware. Multiple universities have already demonstrated vulnerabilities within the TPMS.2 1 “Vehicle-to-Infrastructure (V2I) Communications for Safety,” U.S. Department of Transportation, October 27, 2015, http://www.its.dot.gov/factsheets/v2isafety_factsheet.htm 2 Bright, Peter, “Cars hacked through wireless tire sensors,” arstechnica, August 10, 2015, http://arstechnica.com/security/2010/08/cars-hacked-through-wireless-tyre-sensors/ 2 SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS 3 VEHICLE OPERATION ELECTRONIC KEYLESS ENTRY CONTROL UNITS (ECUS) Thieves have used signal boosters The ECUs that control steering, braking, and interception devices to gain and acceleration can be manipulated unauthorized access to locked TELEMATICS SYSTEM in a compromised vehicle. The vehicles through their keyless Many modern vehicles offer sophisticated telematics systems that incorporate speedometer or engine temperature entry systems.4 The latest trend the radio, Bluetooth and USB connections, GPS, and cellular assist functions. Most gauge can also be forced to show in automotive innovation includes recently, vehicles increasingly feature Wi-Fi access points that provide a small false data, either falsely indicating or mobile applications for keyless wireless LAN to vehicle occupants. Each of these communications technologies masking vehicle malfunction. entry and even remote start. offers a means to compromise and potentially control the vehicle. 15:49 VEHICLE INTERIORSYSTEMS MUSIC PLAYER PHONE First name Last name Today 8:30 First name Last name Yesterday 11:39 First name Last name Yesterday 16:30 0:52 4:23 Hail to the Thief, Radiohead First name Last name Yesterday 21:43 VEHICLE OPERATIONS BROWSER 74 35 PSI - + 60 72 - + ONBOARD DIAGNOSTICS (OBD) PORT CLIMATE CONTROL: A self-diagnostic port where one can A vehicle’s interior climate can affect a driver’s comfort and therefore the plug-in devices used to measure driving ability to safely drive the vehicle. Manipulating climate control systems habits, conduct mechanical diagnostics, through compromised ECUs could blast the heat during the middle of or enhance driver experience is a potential summer, possibly forcing the driver to stop and exit the vehicle. vector for malware.3 For instance, a mechanic could inadvertently infect multiple vehicles using a compromised diagnostic tool. 3 Darren Pauli, “Mechanic computers used to pwn cars in new model-agnostic attack ,” The Register, March 13, 2016, http://www.theregister.co.uk/2016/03/13/mechanic_computers_used_to_pwn_cars_in_new_modelagnostic_attack/ 4 Nick Bilton, “Keeping Your Car Safe from Electronic Thieves,” New York Times, April 15, 2015, http://www.nytimes.com/2015/04/16/style/keeping-your-car-safe-from-electronic-thieves.html 4 SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS 5 TELEMATICS 15:49 GPS NAVIGATION Threat actors 2D could potentially spoof the GPS 0.1 MIILE display to lead Jones Street the driver off the road or collect stored 0.5 MIILE Sansome Street destinations to obtain travel 0.3 MIILE patterns AUDIO Lombard Street RISK SECTION INTRODUCTION SYSTEM Infection vector 16:02 ARRIVAL TIME via USB or 13 MINS streaming media MUSIC PLAYER PHONE First name Last name While analyzing the current and potential risks to vehicles, Today 8:30 CONTACT LIST FireEye reviewed published information to assess various First name Last name The information Yesterday 11:39 held in your threat scenarios, their likelihood of occurring, and their car’s computer First name Last name Yesterday 16:30 could potentially potential impact. We assess the top five risks created by 0:52 4:23 include PII Hail to the Thief, Radiohead First name Last name vehicle software vulnerabilities to be: Yesterday 21:43 VEHICLE OPERATIONS BROWSER 74 35 PSI Unauthorized physical Theft of personally Deliberate manipulation Hijacking vehicle systems Extortion enabled by access to vehicles identifiable information of vehicle operation to enable malicious cyber ransomware that renders WEB from manufacturer or activity vehicles inoperable until BROWSER third-party storage a ransom is paid Web browsers systems often often contain exploitable - + 60 72 - + vulnerabilities USB Infection vector via compromised mobile phones or other devices 6 SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS SPECIAL REPORT / CONNECTED CARS: THE OPEN ROAD FOR HACKERS 7 FIVE RISKS FOR THREATS TO CAR VECTORS RISK 1 RISK 2 GAINING UNAUTHORIZED PHYSICAL ACCESS TO VEHICLES STEALING PERSONALLY IDENTIFIABLE INFORMATION Collecting personally identifiable attack vector could also be extended requirements (both locally and Close access entry methods that enable unauthorized entry into vehicles are information (PII) is a high priority to accessing pattern-of-life data – cloud-based) for vehicles are still the easiest to conduct and therefore among the most common. They present for many criminals, hacktivists, ostensibly innocuous data concerning immature, meaning privacy policies the most immediate and realistic threat to technology-enhanced vehicles, and nation-state threat actors. travel destinations, driving style, and among manufacturers are inconsistent notably because many vehicle manufacturers have opted to replace physical Modern vehicles collect significant potential speeding or traffic violations. and consumers are potentially left ignition systems with keyless systems that utilize mobile phone applications amounts of PII in the course of their vulnerable to exploitation. or wireless keyfobs.5 Most unauthorized entry methods exploit the wireless operation in order to interface with In addition, automated maintenance or communications between the vehicle and the keyfob carried by the driver.6 the myriad of after-market devices diagnostics services that communicate Threat actors may be interested in that communicate with the vehicle’s with a dealership may also offer a the following types of information that operating system. As a result, vehicles potential attack vector for criminals could potentially be accessed through Attackers exploit vulnerabilities in vehicle connectivity technologies to gain unauthorized entry or THREAT can now become an additional attack seeking PII held on dealership a vehicle’s system or stored on the SCENARIO access to a vehicle. vector for parties interested in stealing or manufacturer systems. Laws vehicle itself: High financial information. This novel stipulating protection and storage Likelihood • Thieves have long sought to gain physical entry to locked vehicles. The ability to do so without incurring damage to the vehicle or leaving behind physical evidence lowers any deterrent factor. VEHICLE INFORMATION PERSONAL INFORMATION • Multiple close access and short-range exploitation capabilities could provide Make, Model, Year Owner Name, Address,