Skip to main content

Rail signalling system ‘could be liable to hacking’

A new rail signalling system to be installed across the UK could be liable to hacking, a government adviser has warned. Professor David Stupples told the BBC that the European Rail Traffic Management system (ERTMS) could be exposed to malicious software, or malware, and used to cause an accident perhaps telling the system the train is slowing when down when it is speeding up. "However, he said governments aren't complacent."Certain ministers know this is absolutely possible and they are worried about
April 27, 2015 Read time: 2 mins
A new rail signalling system to be installed across the UK could be liable to hacking, a government adviser has warned.

Professor David Stupples told the BBC that the European Rail Traffic Management system (ERTMS) could be exposed to malicious software, or malware, and used to cause an accident perhaps telling the system the train is slowing when down when it is speeding up.

"However, he said governments aren't complacent."Certain ministers know this is absolutely possible and they are worried about it. Safeguards are going in, in secret, but it's always possible to get around them," he said.

ERTMS uses a computer in the driver's cab to control the speed and movement of the train, whilst taking account of other trains on the railway. Although still operating under the umbrella term of ERTMS, 5021 Network Rail says it is creating its own traffic management system to optimise performance.

Network Rail said it acknowledges the threat. A spokesman said "We know that the risk [of a cyber-attack] will increase as we continue to roll out digital technology across the network. We work closely with government, the security services, our partners and suppliers in the rail industry and external cyber security specialists to understand the threat to our systems and make sure we have the right controls in place."

Related Content

  • May 7, 2020
    Columbia brings the noise to VRUs
    ‘Twalking’ – the practice of staring at a smartphone screen while walking – may be a matter for wry amusement for the non-addicted, but is potentially hazardous to the phone users. A US research project may have found a solution, finds Alan Dron
  • August 18, 2017
    Trend Micro discovers 'indefensible' car security/CAN standard flaw
    Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
  • June 8, 2015
    ITS benefits escape public
    John Kendall considers the public’s awareness of the benefits of ITS. While the results of developing ITS technology may be clear to readers of ITS International, there is far less evidence that drivers have any appreciation of what the technology is doing for them. So how aware are drivers of the developments that are designed to make their journeys less congested and safer?
  • August 10, 2016
    Technologies to protect connected cars ‘not being utilised’
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe