Skip to main content

Jeep hackers return to remotely hack Cherokee’s digital systems

Just a year after they caused Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse. In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. At the Black Hat USA 2016 conference this week the two automot
August 4, 2016 Read time: 2 mins
RSSJust a year after they caused 1958 Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse.

In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt.

At the Black Hat USA 2016 conference this week the two automotive cybersecurity researchers will outline new methods of cyber attack against the same Jeep Cherokee they hacked last year.

According to Miller and Valasek, hackers usually inject CAN messages on to the vehicle's network. However, there are often many limitations on what actions the vehicle can be forced to perform when injecting CAN messages. While an attacker may be able to easily change the speedometer while the car is driving, he may not be able to disable the brakes or turn the steering wheel unless the car he is driving meets certain prerequisites, such as travelling below a certain speed.

In their presentation, they plan to discuss how physical, safety critical systems react to injected CAN messages and how these systems are often resilient to this type of manipulation.

They will also outline new methods of CAN message injection which can bypass many of these restrictions and demonstrate the results on the braking, steering, and acceleration systems of an automobile. They end by suggesting ways these systems could be made even more robust in future vehicles.

Related Content

  • December 12, 2014
    Infrastructure and the autonomous vehicle
    Harold Worrall ponders the effect of autonomous vehicles on transportation infrastructure. For the last century the transportation industry has been focused on the supply of infrastructure to support the ever growing fleet of vehicles and the greater number of miles covered by each vehicle. Our focus has been planning, funding, designing, building and maintaining roadways. Politicians, engineers, planners, financial managers … all of us have had this focus. We have experienced demand growth since the first
  • March 20, 2014
    Adaptive cruise control would suppress traffic instability
    Professor Berthold Horn of Massachusetts Institute of Technology believes a modified adaptive cruise control could mitigate phantom traffic jamsthat occur for no apparent reason. The phenomenon of the phantom traffic jam is all too common: they appear for no apparent reason and, having caused frustrating delays for all travelers, evaporate for an equally mystical reason. Phantom traffic jams usually occur on busy highways and often take the form of repeatedly stopping and then accelerating up to near the
  • August 10, 2016
    Technologies to protect connected cars ‘not being utilised’
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
  • June 19, 2019
    AVs could be ‘terrorist threat’, says security firm Advent IM
    Terrorists who have hijacked vans and trucks to drive into crowds – causing death and injury to pedestrians – could use autonomous vehicles (AVs) to achieve a similar result with no risk to themselves. That was the warning from Mike Gillespie, MD of security firm Advent IM. Speaking this week at the IFSEC International 2019 security conference in London, he said: “Imagine that you don’t have to get in the vehicle, you don’t have to be in the same city – or even the same country.” They would still be a