Skip to main content

Jeep hackers return to remotely hack Cherokee’s digital systems

Just a year after they caused Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse. In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. At the Black Hat USA 2016 conference this week the two automot
August 4, 2016 Read time: 2 mins
RSSJust a year after they caused 1958 Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse.

In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt.

At the Black Hat USA 2016 conference this week the two automotive cybersecurity researchers will outline new methods of cyber attack against the same Jeep Cherokee they hacked last year.

According to Miller and Valasek, hackers usually inject CAN messages on to the vehicle's network. However, there are often many limitations on what actions the vehicle can be forced to perform when injecting CAN messages. While an attacker may be able to easily change the speedometer while the car is driving, he may not be able to disable the brakes or turn the steering wheel unless the car he is driving meets certain prerequisites, such as travelling below a certain speed.

In their presentation, they plan to discuss how physical, safety critical systems react to injected CAN messages and how these systems are often resilient to this type of manipulation.

They will also outline new methods of CAN message injection which can bypass many of these restrictions and demonstrate the results on the braking, steering, and acceleration systems of an automobile. They end by suggesting ways these systems could be made even more robust in future vehicles.

Related Content

  • May 16, 2016
    Auckland’s major road safety operation targets red light running
    Red light running is the focus of a major two week long road safety operation, launching in Auckland, Nerw Zealand, this week, coinciding with the start of Road Safety Week. The operation, in Waitemata District of the city, is a joint initiative between Police, Auckland Transport (AT) and NZ Transport Agency. Police will target those motorists who take risks during peak morning traffic at four key high-risk intersections, which were selected because of their location, crash risk, traffic flow and ability
  • May 16, 2016
    Auckland’s major road safety operation targets red light running
    Red light running is the focus of a major two week long road safety operation, launching in Auckland, Nerw Zealand, this week, coinciding with the start of Road Safety Week. The operation, in Waitemata District of the city, is a joint initiative between Police, Auckland Transport (AT) and NZ Transport Agency. Police will target those motorists who take risks during peak morning traffic at four key high-risk intersections, which were selected because of their location, crash risk, traffic flow and ability
  • May 1, 2014
    Traffic control systems ‘vulnerable to hacking’
    Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
  • January 26, 2012
    Increasing road safety with automated driver assistance systems
    Jon Masters looks at how drivers will be trained to use the increasing number of advanced driver assistance systems being incorporated into modern cars