news-27092024-025049

Vehicle Hacking Threatens Millions due to Website Bug

Security researchers have long been aware of the potential for hackers to hijack internet-connected systems in vehicles. In the past, demonstrations of vehicle hacking required intricate and time-consuming exploits, such as reverse engineering code in telematics units or delivering malicious software through audio tones or CDs. However, a recent discovery by a group of independent researchers has revealed a much simpler and alarming technique to hack and track millions of vehicles through a website bug.

The vulnerability was found in a web portal operated by carmaker Kia, allowing hackers to reassign control of internet-connected features in modern Kia vehicles from the owner’s smartphone to the hackers’ device. By exploiting this flaw, hackers could track a car’s location, unlock the vehicle, honk the horn, or start the ignition remotely. While Kia has since patched the vulnerability, the incident highlights the broader issue of web-based security flaws in the automotive industry.

Easy Exploitation of Web-Based Vulnerabilities

The group of researchers responsible for uncovering the Kia vulnerability has identified similar flaws in the web portals of other car manufacturers, including Acura, Genesis, Honda, Hyundai, Infiniti, and Toyota. These vulnerabilities have exposed millions of vehicles to potential hacking and unauthorized access to connected features. The ease with which these web-based exploits can be executed raises concerns about the overall security of modern vehicles.

According to Neiko Rivera, one of the researchers involved in the investigation, the prevalence of web security flaws in vehicles is a significant issue that requires immediate attention. Despite efforts to address these vulnerabilities, new issues continue to emerge, posing a constant threat to vehicle owners and their personal information.

Implications of Vehicle Hacking

While the Kia hacking technique demonstrated by the researchers did not grant access to critical driving systems like steering or brakes, it had the potential to facilitate theft of a vehicle’s contents, invasion of privacy, and harassment of drivers and passengers. By exploiting the web portal flaw, hackers could access personal information of Kia customers, including names, email addresses, phone numbers, home addresses, and driving routes.

The group’s findings underscore the urgent need for car manufacturers to prioritize web security alongside embedded system security. Stefan Savage, a computer science professor at UC San Diego, emphasizes that the integration of smartphone-enabled features in vehicles has expanded the attack surface for hackers, necessitating a comprehensive approach to cybersecurity in the automotive industry.

In response to the researchers’ report, Kia has taken steps to address the vulnerability in its web portal, but the incident serves as a wake-up call for the industry to bolster its defenses against web-based threats. The researchers hope that their work will prompt car manufacturers to reevaluate their security protocols and prioritize the protection of customer data and vehicle systems.

The discovery of web-based vulnerabilities in multiple carmakers’ websites highlights the growing complexity of securing modern vehicles against cyber threats. As technology continues to advance and vehicles become more connected, the automotive industry must adapt to the evolving landscape of cybersecurity to safeguard consumers and their vehicles from malicious attacks.