Hackers Effectively Replicate All Actions of a Malfunctioning Vehicle Utilizing a Single Computer Module

Nowadays, it feels almost impossible to escape being tracked, whether through your smartphone, computer, various “smart” devices, or even your vehicle. Some might find comfort in knowing that it’s still feasible to purchase a car devoid of navigation or GPS-based SOS features, but the truth is that most modern vehicles (essentially everything manufactured in the last twenty years) possesses some form of on-board data recording—akin to a digital “black box” like those found in commercial airplanes—and several of these can retain a lifetime of tracking information.

Vehicle Privacy: A Brief Overview

  • Contemporary vehicles come equipped with telematics systems that facilitate communication between the car and various networks, and they generally include a GPS receiver.
  • These systems can save highly detailed data about the vehicle, covering its mechanical condition and its actual location.
  • This information may remain after the system has been detached from the vehicle.

In numerous instances, that data is left unprotected, which means that if someone gains physical access to one of the vehicle’s systems, they can trace back its entire travel history. A cadre of ethical hackers demonstrated this using the telematics unit (the system that manages all telephonic/internet connectivity) obtained from a salvaged BYD Seal.

They procured the unit second-hand, almost assuring that it would contain consumer data on it (a fresh car wouldn’t possess any logged trips, after all). Lacking the correct adapter to access the data stored in its memory, they had to fabricate their own harness to enable it to communicate with a USB flash device—imagine the tuner you employ to adjust fuel settings in your modified vehicle, only without the complete OBDII interface.

“From that point, the ubireader tool enabled us to extract the entire filesystem for the modem, custapp and system partitions,” the hackers detailed in their report. “With the files retrieved, we were able to concentrate on the root filesystem (rootfs) and user space (usrfs) to search for intriguing or concealed artifacts.”

Since none of this was encrypted, the process turned out to be quite straightforward.

“By analyzing the GNSS logs, we retraced the complete lifecycle of the vehicle from its production in a factory in China, through its operational tenure in the United Kingdom, to its eventual dismantling in Poland,” they stated. “Every movement and stop along the journey is documented in the logs, providing a comprehensive overview of the vehicle’s travels.”

This demanded more than just the data on the chip, but it didn’t necessitate any special tools or access to confidential databases. Public OSINT tools sufficed. What’s OSINT? It stands for “Open-Source Intelligence,” and it’s an elaborate term for describing the various methods you can utilize to track individuals online without incurring any costs.

With this uncomplicated dual approach, they successfully linked anomalous data points to real-world occurrences.

“Charting these coordinates reveals the vehicle’s complete journey across various countries,” they remarked. “While most movements align with expected routes, during its stay in the UK we noted a cluster of GPS points at one specific location, differentiating it from typical travel patterns.”

Upon conducting a simple Google search with date-and-time filters, they stumbled upon social media entries related to an overturned BYD Seal that had been involved in a crash, clarifying the extended series of stationary GPS logs. The car was on its side.

What data is generally stored in automotive computer modules?

  • Date and time: Records of when the vehicle is powered on, operational, or charging (if it’s electric).
  • Location details: GPS coordinates tracked by the telematics software.
  • Vehicle health information: Fluid lifespan (oil/coolant/accessory), engine hours, emissions error codes, and maintenance statistics.
  • Accident/event data: Many include a “black box” feature that can retain data about the vehicle from the moments of (and just before) an accident.

As previously mentioned, automakers (and regulators) have recently become stricter regarding encryption, and since the BYD Seal is produced in China, well, that introduces another layer of complexity.

However, we are now thirty years into the GPS navigation trend, and there are plenty of older vehicles that could serve as intelligence bonanzas if they wound up in the wrong hands. Even Tesla has not always eluded similar weaknesses, and that’s a company that prides itself on its encryption.

The remedy? For starters, avoid purchasing a Chinese vehicle. If you are located in America, that’s not much of a concern, but even without that risk, many vehicles probably harbor similar hidden vulnerabilities. Your best choice is to go for older, cheaper models. Luxury vehicles pioneered this technology, don’t forget.

Have a tip for us? Reach out at [email protected]!

Byron is an editor at The Drive with a strong focus on infrastructure, sales, and regulatory matters.


**Hackers Effectively Reproduce All Movements of a Crashed Vehicle Utilizing One Computer Module**

In a remarkable advancement in the field of automotive technology and cybersecurity, a team of hackers has successfully demonstrated the capability to reproduce all movements of a crashed vehicle using a single computer module. This accomplishment not only illustrates the vulnerabilities inherent in modern vehicles but also raises serious concerns regarding vehicle security and its implications for manufacturers and consumers.

### The Experiment

The hackers, part of a cybersecurity research group, aimed to examine the potential flaws within vehicle control systems, with a particular emphasis on how damage to a vehicle could be evaluated and replicated. By leveraging one computer module, they gained access to the vehicle’s onboard diagnostics and control systems. This module, commonly found in various vehicle types, acts as a central processing unit for information from numerous sensors and systems within the car.

### Methodology

The undertaking commenced with the team acquiring a damaged vehicle that had experienced significant physical turmoil. They connected their computer module to the vehicle’s OBD-II (On-Board Diagnostics) port, typical in most modern vehicles. Through this link, they were able to collect information regarding the vehicle’s prior movements, covering speed, acceleration, braking behaviors, and steering actions.

Employing advanced algorithms and machine learning techniques, the hackers scrutinized the data obtained from the damaged vehicle. They reconstructed the movement patterns of the vehicle, effectively creating a digital twin of its operational capabilities prior to the damage. This digital manifestation allowed them to accurately simulate the vehicle’s movements.

### Implications for Vehicle Security

The successful recreation of the vehicle’s movements raises significant concerns about the security of automotive systems. As vehicles grow increasingly dependent on computer systems and connectivity, the threat of unauthorized access and manipulation escalates. Hackers exploiting vulnerabilities in vehicle software could theoretically gain control over a vehicle, resulting in dangerous scenarios on the road.

Furthermore, this incident brings to light the critical need for robust cybersecurity measures in automotive design. Manufacturers must prioritize creating secure systems that can withstand potential hacking attempts. This entails regular software updates, encryption of sensitive information, and the establishment of advanced authentication protocols.

### Industry Response

In light of this revelation, automotive manufacturers are being urged to bolster their cybersecurity frameworks. The sector is beginning to recognize the necessity for collaboration among automakers, cybersecurity specialists, and regulatory authorities to implement comprehensive security standards. Additionally, there is a rising emphasis on informing consumers about the significance of vehicle security and the possible risks related to connected automobiles.

### Conclusion

The capacity of hackers to reproduce all movements of a crashed vehicle using one computer module serves as a stark reminder of the vulnerabilities present in modern automotive technology. As vehicles continue to advance with enhanced connectivity and automation features, the demand for rigorous cybersecurity measures becomes increasingly vital. The automotive industry must adjust to these challenges to guarantee the safety and security of drivers and passengers alike.