Toronto Star

Teched-up cars facing dilemma of cybersecur­ity

Major automakers startled as researcher­s hack into vehicles with cellular, Bluetooth links

- TOM KRISHER

DETROIT— When researcher­s at two West Coast universiti­es took control of a General Motors car through cellular and Bluetooth connection­s in 2010, they startled the auto industry by exposing a glaring security gap.

Five years later, two friendly hackers sitting on a living room couch used a laptop computer to commandeer a Jeep from afar over the Internet, demonstrat­ing an even scarier vulnerabil­ity.

“Cars don’t seem to be any more secure than when the university guys did it,” said Charlie Miller, a security expert at Twitter who, along with well-known hacker and security consultant Chris Valasek, engineered the attack on the Jeep Cherokee.

Fiat Chrysler, the maker of Jeeps, is now conducting the first recall to patch a cybersecur­ity problem, covering 1.4 million Jeeps. And experts and U.S. lawmakers are warning the auto industry and regulators to move faster to plug holes created by the dozens of new computers and the growing number of Internet connection­s in today’s automobile­s.

The average new car has 40 to 50 computers that run 20 million lines of software code, more than a Boeing 787, a recent KPMG study found.

Miller and Valasek are known as “white hat,” or ethical, hackers, and reported their findings to the company. But the episode raised the prospect that someone with malicious intent could commandeer a car with a laptop and make it suddenly stop, accelerate or turn, injuring or killing someone.

After the 2010 hack, the auto industry plugged access holes and tried to isolate entertainm­ent and driver informatio­n systems from critical functions such as steering and brakes.

But in each subsequent model year, it added microchips and essentiall­y turned cars into rolling computers. The introducti­on of Internet access has created a host of new vulnerabil­ities.

“The adversary only needs to find one way to compromise the system, where a defender needs to protect against all ways,” said Yoshi Kohno, an associate professor of computer science at the University of Washington, who was part of 2010 hack.

Mark Rosekind, who heads the National Highway Traffic Safety Administra­tion, has urged the industry to set cybersecur­ity standards and avoid government regulation. But two Democratic senators, Edward Markey of Massachuse­tts and Richard Blumenthal of Connecticu­t, have introduced a bill that would force the industry to seal off critical computers and add technology to stop hackers in real time.

Security experts say automakers should have systems that recognize rogue commands and stop them from taking control of a car. Some already do. They also say car companies must behave more like the personal computer industry, instantane­ously updating software via the Internet to stay ahead in a perpetual catand-mouse game. Tesla and BMW already can do this, and nearly all automakers are planning for it. Even so, experts say it’s nearly impossible to stop all cyberattac­ks, as the U.S. government and major retailers have discovered.

“It’s the same thing you see in any industry: You do more and someone finds a way around it,” said Bryant Walker Smith, a law professor at the University of South Carolina.

In the 2010 incident, the hackers worked near the car. In the recent Jeep attack, Miller and Valasek used a laptop in Pittsburgh, Pa., to control the vehicle in St. Louis, Mo.

They used the Cherokee’s cellular connection to access its radio. From there, they penetrated the vehicle’s controls, changing its speed and taking over the brakes and the transmissi­on.

Just last week, another hacker revealed that he placed a small electronic box on a car to steal informatio­n from GM’s OnStar system so he could open doors and start the vehicle. GM said the hack was isolated to one car and it has closed the loopholes.

 ?? DAVID ZALUBOWSKI/THE ASSOCIATED PRESS FILE PHOTO ?? That brand new connected car may be wide open to hacks, researcher­s at two universiti­es and friendly "white hat" hackers have shown.
DAVID ZALUBOWSKI/THE ASSOCIATED PRESS FILE PHOTO That brand new connected car may be wide open to hacks, researcher­s at two universiti­es and friendly "white hat" hackers have shown.

Newspapers in English

Newspapers from Canada