The flaw, according to Kamkar, is the automaker’s almost childlike faith that the certificate on the remote server is valid, disregarding what kind of network provides the connection and whether it’s a legitimate remote server or one that just says it is.
How it works
OwnStar uses the phone’s preference for WiFi networks to its advantage. On the AT&T mobile network, if an iOS device sees the SSID “attwifi” being broadcast by OwnStar, it attempts to pair with the OwnStar device, which happily complies as a passthrough, all the while capturing and remembering the data stream. The hacker could get into the car and start or shut down the engine, but not actually drive away.
Should be patchable
Kamkar says he’s alerted the current crop of vulnerable automakers — BMW, Mercedes, Chrysler — of the need to pitch their wireless systems. For now, in cases there are hackers in the mall parking lot, don’t use wireless access. No problem using your remote key fob; that’s safe. Probably.Who hasn’t been hacked yet?
In reader comment posts to many of the stories floating about this month, people who say they’ve been engineers or QA testers were often doing their work in the labs or shops with mock dashboards rather than out on the highway. In the lab, it was assumed there were no vulnerabilities (true for the lab), and they felt comfortable using commonplace passwords such as “testpass” and/or accepting any logon attempt that seemed valid. If a WiFi device SSID read “attwifi,” it was valid, they let their guard down, and didn’t protect against the dangers to the cars in real-life situations. And until Kamkar came along, the minimal defenses were enough. Not any more.
No comments:
Post a Comment