Detroit TAC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, August 19, 2011

Texting, grand theft auto style; alarms pose risk

Posted on 10:11 AM by Unknown

By JORDAN ROBERTSON, AP

news-national-20110819-US.TEC.Auto.Theft.by.Texting In this photo taken Tuesday, Aug. 16, 2011, security consultants Don Bailey,...

SAN FRANCISCO — Texting and driving don't go well together — though not in the way you might think.
Computer hackers can force some cars to unlock their doors and start their engines without a key by sending specially crafted messages to a car's anti-theft system. They can also snoop at where you've been by tapping the car's GPS system.
That is possible because car alarms, GPS systems and other devices are increasingly connected to cellular telephone networks and thus can receive commands through text messaging. That capability allows owners to change settings on devices remotely, but it also gives hackers a way in.
Researchers from iSEC Partners recently demonstrated such an attack on a Subaru Outback equipped with a vulnerable alarm system, which wasn't identified. With a laptop perched on the hood, they sent the Subaru's alarm system commands to unlock the doors and start the engine.
Their findings show that text messaging is no longer limited to short notes telling friends you're running late or asking if they're free for dinner.
Texts are a powerful means of attack because the devices that receive them generally cannot refuse texts and the commands encoded in them. Users can't block texts; only operators of the phone networks can.
These devices are assigned phone numbers just like fax machines. So if you can find the secret phone number attached to a particular device, you can throw it off by sending your own commands through text messaging.
Although these numbers are only supposed to be known by the devices' operators, they aren't impossible to find. Certain network-administration programs allow technicians to probe networks to see what kinds of devices are on them. Based on the format of the responses, the type and even model of the device can be deduced. Hackers can use that information to craft attacks against devices they know are vulnerable. (In this case, the researchers bypassed these steps and simply took the alarm system out of the car to identify the secret phone number.)
Actually stealing a car wouldn't be so easy.
You'd have to ensure that the phone number you found is attached to the car you're standing in front of, for instance. There are hacking tools to do that — they listen for cellular traffic around a particular vehicle — but in many cases it's easier to take a car that doesn't have an alarm.
The research from Don Bailey and Mat Solnik is unsettling because it shows that such attacks are possible on a variety of other devices that use wireless communications chips. Those include ATMs, medical devices and even traffic lights. Hackers have already sent specially crafted texts with commands to instantly disconnect iPhones from the cellular network.
Bailey, whose specialty is cellphone network security, also found that similar techniques can be used to get a certain type of GPS system to cough up its location data. Such information can be used by stalkers or home burglars, for instance.
The type of GPS system he studied is known as assisted GPS, which means that it uses cellular signals in addition to the usual satellite signals. That makes the system vulnerable.
The research isn't just about taking off with someone else's car or finding out where that person has been.
It raises the possibility of other, more sinister dangers, such as those potentially affecting braking and acceleration, said Scott Borg, director of the U.S. Cyber Consequences Unit, a group that studies hacking threats. That becomes possible as networked electronics are more tightly coupled with physical machinery.
"Doing one that is harmful is quite hard, but we need to prepare for people doing that," Borg said.
The research got the attention of a trade group for electric utilities, the North American Electric Reliability Corp. After the pair showed off the techniques at the Black Hat security conference in Las Vegas this month, the group warned that the types of wireless chips exploited by the pair are also used at power plants and said that more caution is needed in their use.
The vulnerable GPS system was made by Zoombak Inc., which promotes its products' usefulness in tracking children and automobiles. The company said it has made changes to its devices, so that outside parties can no longer get location data without passwords.
Bailey and Solnik are working with the manufacturer of the car alarm system to fix its vulnerabilities. Bailey said the unidentified manufacturer has fixed many of the security issues.
Bailey said stricter security standards are needed.
"We're so excited to use technology that we're deploying it too quickly and not really thinking about the impact of security," he said.
___
Online:
Video demonstration of attack: http://bit.ly/n6axTv
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tech News Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Rise of the 'maker movement'
    Rise of the 'maker movement' What does 'do-it-yourself' culture mean for the future of development?  ...
  • Quantum Computing Almost Here
    R. Colin Johnson   IBM recently demonstrated the components necessary to build a quantum computer, including superconducting microchips th...
  • How a Baptist pastor in Florida became the go-to IT guy
    NorthRidge Church pastor Terrill Gilley installs security gateways, watches for network attacks By Ellen Messmer   As a Baptist pastor,...
  • When touring the Large Hadron Collider, stay with your group
  • 14 Ways to Take Your IT Career to the Next Level - Network World
    14 Ways to Take Your IT Career to the Next Level - Network World
  • Medical Privacy Secured on Smartphones
    R. Colin Johnson | Anti-cloning encryption technology is being used to secure validated medical data, which can only be accessed by an att...
  • 10 Free Google Chrome Extensions to Increase Your Productivity - Network World
    10 Free Google Chrome Extensions to Increase Your Productivity - Network World
  • The No. 1 place to work in IT: Quicken Loans - Network World
    The No. 1 place to work in IT: Quicken Loans - Network World
  • The ACTEra – WHY YOU SHOULD HAVE BEEN AT THE BDPA 2013 CONFERENCE! | The Aspiring Critical Thinker's Era
    The ACTEra – WHY YOU SHOULD HAVE BEEN AT THE BDPA 2013 CONFERENCE! | The Aspiring Critical Thinker's Era
  • 10 hard-earned lessons of a lifetime in IT - Network World
    10 hard-earned lessons of a lifetime in IT - Network World

Categories

  • Android (1)
  • BDPA (3)
  • BDPA Local Chapter (3)
  • Career Networking (20)
  • Cool Stuff (14)
  • Education Tech (8)
  • Election (1)
  • FoodforThought (32)
  • FreeStuff (2)
  • Funny (2)
  • Green Power (7)
  • Hackerspace (6)
  • Local Tech Events (2)
  • Med Tech News (9)
  • Money (1)
  • MovieTech (1)
  • New Technology (5)
  • Open Source Tech News (7)
  • Personal Achievement (1)
  • personal rant (1)
  • Presidental (2)
  • SocialNetworkTech (1)
  • Space Tech (10)
  • Tech News (35)
  • Tech News Security (12)
  • Tech Tip (5)
  • Tech Tips (1)
  • Tech Toys (2)

Blog Archive

  • ►  2013 (202)
    • ►  September (6)
    • ►  August (21)
    • ►  July (17)
    • ►  June (17)
    • ►  May (26)
    • ►  April (23)
    • ►  March (32)
    • ►  February (28)
    • ►  January (32)
  • ►  2012 (200)
    • ►  December (27)
    • ►  November (31)
    • ►  October (33)
    • ►  September (12)
    • ►  August (14)
    • ►  July (5)
    • ►  June (9)
    • ►  May (13)
    • ►  April (9)
    • ►  March (24)
    • ►  February (10)
    • ►  January (13)
  • ▼  2011 (95)
    • ►  December (10)
    • ►  November (27)
    • ►  October (18)
    • ►  September (11)
    • ▼  August (24)
      • Irene's wrath leaves 6,500 cell towers out, FCC says
      • How Social Media Improves Disaster Response
      • Hundreds of U.S. Data Centers Closing
      • Focus: HOPE career training programs!
      • Evolution Has Ossified the Internet
      • Pieces of Gold in Those Job Postings
      • How to Create a Job for Yourself
      • Motivational Moment
      • Motivational Moment
      • IBM Debuts Brainlike Cognitive Computer
      • Game Theory Improves Detection of Security Breaches
      • Texting, grand theft auto style; alarms pose risk
      • Gator power: Alligator fat pitched as biodiesel
      • Webcam System Reduces Workplace Back Problems
      • Motivational Moment
      • Anonymous breaches San Francisco's public transpor...
      • Motivational Moment
      • Motivational Moment
      • Why Tablets Don't Kill the Laptop
      • Motivational Moment
      • Why Wi-Fi as we know it is in trouble
      • Wet Electronics Open Door to New Possibilities
      • Social Media Fuels New Web-Based Political Party
      • The BDPA Insider - July 31, 2011
    • ►  July (5)
Powered by Blogger.

About Me

Unknown
View my complete profile