Skip to main content

Jeep hackers return to remotely hack Cherokee’s digital systems

Just a year after they caused Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse. In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. At the Black Hat USA 2016 conference this week the two automot
August 4, 2016 Read time: 2 mins
RSSJust a year after they caused 1958 Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse.

In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt.

At the Black Hat USA 2016 conference this week the two automotive cybersecurity researchers will outline new methods of cyber attack against the same Jeep Cherokee they hacked last year.

According to Miller and Valasek, hackers usually inject CAN messages on to the vehicle's network. However, there are often many limitations on what actions the vehicle can be forced to perform when injecting CAN messages. While an attacker may be able to easily change the speedometer while the car is driving, he may not be able to disable the brakes or turn the steering wheel unless the car he is driving meets certain prerequisites, such as travelling below a certain speed.

In their presentation, they plan to discuss how physical, safety critical systems react to injected CAN messages and how these systems are often resilient to this type of manipulation.

They will also outline new methods of CAN message injection which can bypass many of these restrictions and demonstrate the results on the braking, steering, and acceleration systems of an automobile. They end by suggesting ways these systems could be made even more robust in future vehicles.

Related Content

  • February 6, 2020
    Polarised imaging gives enforcement clarity
    Polarised imaging advances have finally allowed ITS technology to catch up with previously unenforceable international bans on smoking in cars, says Sony’s Stephane Clauss
  • October 28, 2014
    The ABC of CARTES 2014: Apple, Bitcoin and cloud security are all on the conference agenda
    CARTES 2014, the global event for payment, identification and mobility, is fast approaching and the world’s experts in the sector are about to head to Paris for its biggest and most important annual gathering. The 2013 event welcomed more than 20,000 visitors, some 1,670 of whom attended the opening conference - the World Card Summit - while also visiting the 450 exhibitors at the venue.
  • September 12, 2024
    Cisco’s 5 steps to cyber-resilient roadways
    As the ITS world becomes ever more connected, cybersecurity risks are increasing. Cisco experts Pete Kavanagh and Angela Murphy explain how to overcome key challenges
  • January 29, 2016
    Emerging technologies that could have major impacts on transportation
    A recent report by US Volpe experts identifies eleven emerging technologies and innovative applications that may have significant impacts on our transportation systems within three to five years. The report, 2015 OST-R Transportation Technology Scan: A Look Ahead, identifies technological advances and innovative concepts, along with their associated benefits, challenges and risks that could fundamentally alter the transportation landscape: