Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • Growth of OEM telematics in new passenger cars
    March 3, 2016
    The latest research by ABI Research forecasts the global penetration of embedded and hybrid factory installed OEM telematics in new passenger cars to exceed 72 per cent by 2021. Growth will mainly be driven by key volume car OEMs in the US, European Union and China markets. Brands within these markets showing accelerated growth include GM, which expects to reach 12 million OnStar subscribers globally by the end of 2016, including its Opel brand in Europe and Cadillac in China; and Ford, which claims to have
  • UN vehicle regulations ‘could prevent deaths and injuries in Brazil’
    November 17, 2015
    A new research report from the UK’s Transport Research Laboratory (TRL) has revealed that 34,000 Brazilian lives could be saved and 350,000 serious injuries prevented by 2030, if UN vehicle safety regulations were adopted and car manufacturers sought to achieve higher ratings in the Latin NCAP crash test programme. Published on the eve of the second High Level Conference on Road Safety in Brazil, the independent study, which was commissioned by Global NCAP, highlights the gap between the regulated vehicl
  • Westminster detects disabled parking bay abuse
    March 16, 2016
    Westminster trials scheme to detect non-qualifying motorists using disabled parking bays. The provision of disabled parking bays has become commonplace - but so has the abuse of these bays by able-bodied motorists. Now, London’s Westminster City Council is running a trial of technology that detects when a vehicle is illegally parked in a disabled bay.
  • SCANaCAR and VideoBadge counter parking’s prickly problems.
    June 4, 2014
    Colin Sowman discovers how the latest systems can boost productivity and reduce conflict in parking enforcement. Parking enforcement is something of a ‘Cinderella’ service for local authorities: while necessary to keep the roads open and the traffic flowing, it is an expensive operation and can be loss-making. It is also labour intensive and parking enforcement officers are routinely verbally abused and sometimes physically attacked. Some authorities are now looking to automate parking enforcement in orde