Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • Sorting sensible from shiny in tolling technology
    December 11, 2014
    Instead of always striving for the latest shiny toys Kevin Hoeflich of HNTB advises a 10-steps method for selecting the most appropriate technology. Amid the hype and razzmatazz surrounding the launch of Apple’s iPhone 6, the company also announced its new mobile payment system, Apple Pay. Built into the new iPhone 6, Apple Pay works at 220,000 merchants across America and is supported by major US banks and the big three credit card companies.
  • Traffic cameras embrace AI
    December 19, 2022
    Artificial intelligence is spreading into many aspects of mobility – but what about traffic management and enforcement cameras? ITS International invited a few vision experts to ponder a couple of leading questions…
  • Siqura XSNet Ethernet switches upgrade
    August 30, 2012
    TKH Security Solutions has released its new Siqura XSNet Ethernet switch line. The XSNet 3000 and XSNet 4000 series provides a complete offering of managed/unmanaged switches and media convertors. This series offers hardened units for operation under extreme conditions as well as a selection of powering options, including PoE. Additionally, the XSNet 3000 / 4000 line includes optional SFP (or mini GBIC) interfaces that enable these devices to transmit Ethernet/IP signals directly over fibre optic, Cat 5, or
  • TransWiseway and IBM building China’s largest connected vehicles platform
    June 2, 2014
    IBM is collaborating with Beijing transportation information service systems provider TransWiseway Information Technology to build the largest connected vehicles platform in China that will transform the development of the country’s connected car services industry. The cloud-based platform will use advanced analytics for applications that offer real-time in-vehicle services to mobile devices, such as weather advisories, traffic alerts and alternate route suggestions.