Skip to main content

Jeep hackers return to remotely hack Cherokee’s digital systems

Just a year after they caused Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse. In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. At the Black Hat USA 2016 conference this week the two automot
August 4, 2016 Read time: 2 mins
RSSJust a year after they caused 1958 Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse.

In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt.

At the Black Hat USA 2016 conference this week the two automotive cybersecurity researchers will outline new methods of cyber attack against the same Jeep Cherokee they hacked last year.

According to Miller and Valasek, hackers usually inject CAN messages on to the vehicle's network. However, there are often many limitations on what actions the vehicle can be forced to perform when injecting CAN messages. While an attacker may be able to easily change the speedometer while the car is driving, he may not be able to disable the brakes or turn the steering wheel unless the car he is driving meets certain prerequisites, such as travelling below a certain speed.

In their presentation, they plan to discuss how physical, safety critical systems react to injected CAN messages and how these systems are often resilient to this type of manipulation.

They will also outline new methods of CAN message injection which can bypass many of these restrictions and demonstrate the results on the braking, steering, and acceleration systems of an automobile. They end by suggesting ways these systems could be made even more robust in future vehicles.

For more information on companies in this article

Related Content

  • TRA 2018: Vienna conference highlights
    June 5, 2018
    Digitalisation of transport systems, the regulation of new technologies and more charging points for electric vehicles in cities were among the talking points at this year’s Transport Research Arena conference. Alan Dron sifts through the highlights in Vienna. More than 3,000 transport sector specialists converged on TRA 2018, where the four-day event’s agenda included scores of topics covering regulation, technology and the effect of the digitalisation of road transport systems. Who should control those
  • Pioneering IntelliDrive technologies in Michigan
    February 2, 2012
    Pete Goldin reports on upgrades to the USDOT's Michigan Test Bed, where IntelliDrive technologies are being pioneered
  • Kyiv Digital: “We never thought we’d create app functionality for missile attacks”
    August 15, 2022
    Russia’s invasion of Ukraine has brought devastating change. Adam Hill reports on how the capital city’s transit app was reconfigured to help citizens stay safe under Russian bombardment – and to record evidence of war crimes
  • Global automotive cyber security market to be ‘worth US$31.8 million by 2021’
    July 12, 2016
    A new report from MarketsandMarkets projects the global automotive security market to grow at a CAGR of 13.3 per cent between 2016 and 2021, reaching a market size of US$31.8 million by 2021. According to the report, Automotive Cyber Security Market by Security Type, the major factors behind the growth of the global automotive cyber security market are the growing connected cars being introduced from OEMs and rising security concerns among end-users.