Skip to main content

Jeep hackers return to remotely hack Cherokee’s digital systems

Just a year after they caused Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse. In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. At the Black Hat USA 2016 conference this week the two automot
August 4, 2016 Read time: 2 mins
RSSJust a year after they caused 1958 Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse.

In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt.

At the Black Hat USA 2016 conference this week the two automotive cybersecurity researchers will outline new methods of cyber attack against the same Jeep Cherokee they hacked last year.

According to Miller and Valasek, hackers usually inject CAN messages on to the vehicle's network. However, there are often many limitations on what actions the vehicle can be forced to perform when injecting CAN messages. While an attacker may be able to easily change the speedometer while the car is driving, he may not be able to disable the brakes or turn the steering wheel unless the car he is driving meets certain prerequisites, such as travelling below a certain speed.

In their presentation, they plan to discuss how physical, safety critical systems react to injected CAN messages and how these systems are often resilient to this type of manipulation.

They will also outline new methods of CAN message injection which can bypass many of these restrictions and demonstrate the results on the braking, steering, and acceleration systems of an automobile. They end by suggesting ways these systems could be made even more robust in future vehicles.

For more information on companies in this article

Related Content

  • Don’t drive drunk – or use a hands-free phone
    August 29, 2019
    Despite law changes, drivers’ bad habits have been creeping back in. TRL’s Dr Shaun Helman tells Adam Hill why using a phone at the wheel is just as distracting as driving after a few drinks esearch from as far back as 2002 (see box) suggests that driving while making a phone call – either hands-free or holding a handset to your ear – creates the same amount of distraction as being drunk behind the wheel. While it is notoriously hard to predict how alcohol will affect an individual (due to the speed of
  • Autonomous vehicles are everywhere says report
    March 20, 2015
    A new IDTechEx report, Autonomous Vehicles: Land, Water, Air 2015-2035 claims autonomous vehicles are successful here and now but you are unlikely to meet one because the successes are in the upper atmosphere, open cast mines, nuclear power stations, underwater and in other relatively inaccessible places. It goes on to explains that the primary technology of an autonomous vehicle is that which confers autonomy and the powertrain, which is usually electric. The powertrain and navigation and control technolo
  • ITS World Congress examines challenges of autonomous vehicles?
    December 11, 2015
    The 2015 ITS World Congress opening ceremony saw PSA Peugeot Citroën executives arrive in an autonomous vehicle, so the International Benefits, Evaluation and Costs (IBEC) Working Group’s dedicated session proved very timely.
  • Seoul building cyber attack-resistant traffic and transport control system
    April 17, 2012
    According to a report in the Korea Times today, Seoul city officials are city urgently undertaking the development and of an integrated traffic information and operation system resistant to cyber terrorism to guard the city's traffic network from outside attacks. The Seoul Metropolitan Government said it plans to build an advanced transport management system that monitors the total traffic network around the clock by the end of this year, as part of efforts to vigilantly respond against any security threat.