http://it.slashdot.org/story/23/04/07/210259/crooks-are-using-can-injection-attacks-to-steal-cars" rel="nofollow - https://it.slashdot.org/story/23/04/07/210259/crooks-are-using-can-injection-attacks-to-steal-cars
"Thieves has [sic] discovered new ways to steal cars by pulling off smart devices (like smart headlights) to get at and https://www.theregister.com/2023/04/06/can_injection_attack_car_theft" rel="nofollow - attack via the Controller Area Network (CAN) bus ," writes longtime Slashdot reader https://slashdot.org/~KindMind" rel="nofollow - KindMind .
The Register reports:
A Controller Area Network (CAN) bus is present in nearly all modern
cars, and is used by microcontrollers and other devices to talk to each
other within the vehicle and carry out the work they are supposed to do.
In a CAN injection attack, thieves access the network, and introduce
bogus messages as if it were from the car's smart key receiver. These
messages effectively cause the security system to unlock the vehicle and
disable the engine immobilizer, allowing it to be stolen. To gain this
network access, the crooks can, for instance, break open a headlamp and
use its connection to the bus to send messages. From that point, they
can simply manipulate other devices to steal the vehicle.
"In most cars on the road today, these internal messages aren't
protected: the receivers simply trust them," [Ken Tindell, CTO of Canis
Automotive Labs] detailed in https://kentindell.github.io/2023/04/03/can-injection/" rel="nofollow - a technical write-up
this week. The discovery followed an investigation by Ian Tabor, a
cybersecurity researcher and automotive engineering consultant working
for EDAG Engineering Group. It was driven by the theft of Tabor's RAV4.
Leading up to the crime, Tabor noticed the front bumper and arch rim had
been pulled off by someone, and the headlight wiring plug removed. The
surrounding area was scuffed with screwdriver markings, which, together
with the fact the damage was on the kerbside, seemed to rule out damage
caused by a passing vehicle. More vandalism was later done to the car:
gashes in the paint work, molding clips removed, and malfunctioning
headlamps. A few days later, the Toyota was stolen.
Refusing to take the pilfering lying down, Tabor used his experience to
try to figure out how the thieves had done the job. The MyT app from
Toyota -- which among other things allows you to inspect the data logs
of your vehicle -- helped out. It provided evidence that Electronic
Control Units (ECUs) in the RAV4 had detected malfunctions, logged as
Diagnostic Trouble Codes (DTCs), before the theft. According to Tindell,
"Ian's car dropped a lot of DTCs." Various systems had seemingly failed
or suffered faults, including the front cameras and the hybrid engine
control system. With some further analysis it became clear the ECUs
probably hadn't failed, but communication between them had been lost or
disrupted. The common factor was the CAN bus.
------------- "If you didnt buy your 1st gen 4Runner new, then YOU are a newbie!!"
BRC Life Member
|