Skip to main content

Jeep hackers return to remotely hack Cherokee’s digital systems

Just a year after they caused Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse. In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. At the Black Hat USA 2016 conference this week the two automot
August 4, 2016 Read time: 2 mins
RSSJust a year after they caused 1958 Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse.

In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt.

At the Black Hat USA 2016 conference this week the two automotive cybersecurity researchers will outline new methods of cyber attack against the same Jeep Cherokee they hacked last year.

According to Miller and Valasek, hackers usually inject CAN messages on to the vehicle's network. However, there are often many limitations on what actions the vehicle can be forced to perform when injecting CAN messages. While an attacker may be able to easily change the speedometer while the car is driving, he may not be able to disable the brakes or turn the steering wheel unless the car he is driving meets certain prerequisites, such as travelling below a certain speed.

In their presentation, they plan to discuss how physical, safety critical systems react to injected CAN messages and how these systems are often resilient to this type of manipulation.

They will also outline new methods of CAN message injection which can bypass many of these restrictions and demonstrate the results on the braking, steering, and acceleration systems of an automobile. They end by suggesting ways these systems could be made even more robust in future vehicles.

Related Content

  • ITS for Urban Mobility forum report
    May 16, 2012
    A joint initiative of Ertico – ITS Europe, the European Commission and Eurocities, a Forum on ITS for Urban Mobility was held in Brussels yesterday to discuss and provide feedback on the draft guidelines for the deployment of ITS in urban areas, developed by DG Move’s Expert Group on Urban Mobility. As Nicolas White reports, the guidelines discussed focused on three crucial aspects of urban ITS: multimodal information services, smart ticketing and traffic management & urban logistics.
  • 2015 ITS America annual meeting opens in Pittsburgh
    May 1, 2015
    For anyone involved in the ITS industry, the Opening Plenary of the 2015 ITS Annual Meeting will be an unmissable event. It will fully explore the event’s theme – Bridges to Innovation – and speakers will include the newly announced President and CEO of ITS America, Regina Hopper, Kirk Steudle, Director, Michigan DOT and Chairman, ITS America Board of Directors, Daniel G. Corey, Chairman, Pittsburgh Organizing Committee as well as Federal, State and Local Officials along with additional speakers. The sessi
  • New York’s Central Avenue to trial LED street lights
    July 12, 2016
    The New York State Energy Research and Development Authority (NYSERDA) and the New York State Department of Transportation (NYSDOT) are to install LED street lights on a section of Central Avenue in Colonie, Albany County, in a bid to enhance visibility and safety, as well as reduce energy costs.
  • Vehicle cybersecurity guidebook published
    January 21, 2016
    SAE International has published its guidebook on vehicle cybersecurity, SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Standards, which establishes a set of high-level guiding principles for cybersecurity as it relates to cyber-physical vehicle systems. The guidebook includes: Definition of a complete lifecycle process framework that can be tailored and utilised within each organisation’s development processes to incorporate cybersecurity into cyber-physical vehicle systems from concept ph