Skip to main content

Jeep hackers return to remotely hack Cherokee’s digital systems

Just a year after they caused Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse. In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. At the Black Hat USA 2016 conference this week the two automot
August 4, 2016 Read time: 2 mins
RSSJust a year after they caused 1958 Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse.

In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt.

At the Black Hat USA 2016 conference this week the two automotive cybersecurity researchers will outline new methods of cyber attack against the same Jeep Cherokee they hacked last year.

According to Miller and Valasek, hackers usually inject CAN messages on to the vehicle's network. However, there are often many limitations on what actions the vehicle can be forced to perform when injecting CAN messages. While an attacker may be able to easily change the speedometer while the car is driving, he may not be able to disable the brakes or turn the steering wheel unless the car he is driving meets certain prerequisites, such as travelling below a certain speed.

In their presentation, they plan to discuss how physical, safety critical systems react to injected CAN messages and how these systems are often resilient to this type of manipulation.

They will also outline new methods of CAN message injection which can bypass many of these restrictions and demonstrate the results on the braking, steering, and acceleration systems of an automobile. They end by suggesting ways these systems could be made even more robust in future vehicles.

Related Content

  • Tesla crash in China puts autonomous cars in the spotlight again
    August 11, 2016
    Tesla is investigating the crash in Beijing, China last week, when a Tesla Model S in autopilot mode hit the side of a parked car. According to Reuters, Tesla said it had reviewed data to confirm the car was in autopilot mode, a system that takes control of steering and braking in certain conditions. Tesla also said it was the driver's responsibility to maintain control of the vehicle. In this case, it said, the driver's hands were not detected on the steering wheel. "The driver of the Tesla, whose h
  • Weigh in Motion gets smarter
    January 4, 2023
    Weigh in Motion technology is at the forefront of protecting road surfaces and helping enforcement activity – but could it also play a key role in the development of Smart Cities?
  • When weather warnings get hyperlocal
    August 24, 2016
    David Crawford looks at new technologies to cope with the age-old problem of driving in bad weather. On the 10-year average, between 2005 and 2014 bad weather contributed to more than 1.5 million vehicle crashes in the US each year, resulting in more than 800,000 injuries and 7,400 deaths. These were the findings of analysis by Booz Allen Hamilton of NHTSA data which concluded that the loss of life, hospital treatment and damage to assets costs an annual average of $42bn.
  • MIT researchers hack into traffic lights
    August 22, 2014
    With permission from a local road agency, researchers in from the University of Michigan hacked into nearly 100 wirelessly networked traffic lights, highlighting security issues that they say are likely to pervade networked traffic infrastructure around the country. More than 40 states currently use such systems to keep traffic flowing as efficiently as possible, helping to reduce emissions and delays. The team, led by University of Michigan computer scientist J. Alex Halderman, found three major weaknes