{"id":5362,"date":"2015-01-27T05:39:19","date_gmt":"2015-01-27T10:39:19","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5362"},"modified":"2020-02-26T15:10:51","modified_gmt":"2020-02-26T15:10:51","slug":"progressive-snapshot-car-hacking","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/progressive-snapshot-car-hacking\/5362\/","title":{"rendered":"Progressive Snapshot Exposes Drivers to Car Hacking"},"content":{"rendered":"<p>Not surprisingly, one researcher realized last week that he could <a href=\"https:\/\/threatpost.com\/holes-in-progressive-dongle-could-lead-to-car-hacks\/110511\" target=\"_blank\" rel=\"noopener nofollow\">exploit Progressive\u2019s Snapshot driver tracking tool<\/a> in order to hack into the on-board networks of certain auto-mobiles. Snapshot is a tool manufactured by Progressive auto insurance that plugs into the <a href=\"http:\/\/en.wikipedia.org\/wiki\/On-board_diagnostics#OBD-II\" target=\"_blank\" rel=\"noopener nofollow\">OBD-II port<\/a>. It\u2019s purpose is to monitor driving behaviour in order to offer cheaper insurance rates to safer drivers.<\/p>\n<p>For the uninitiated, the OBD-II is the input port down beneath and, in general, slightly to the left of your steering wheel. It\u2019s the port into which your mechanic plugs his emissions inspection machine to check all the codes in your car\u2019s computer systems to make sure you aren\u2019t polluting. It\u2019s also the port into which you can plug a diagnostic scanner to check why your check engine light has turned on.<\/p>\n<p>Very simply put, your car\u2019s computer network is going to consist of sensors, electrical control units and the <a href=\"http:\/\/en.wikipedia.org\/wiki\/CAN_bus\" target=\"_blank\" rel=\"noopener nofollow\">controller area network<\/a> (CAN) bus. The ECUs, of which there can be very many, serve a variety of purposes, but mainly they process signals from sensors monitoring everything from engine control to airbags to any number of other things I\u2019ve never heard of. ECUs are connected together and communicate via the CAN bus. So, for example, if you crash your car, some sensor somewhere tells its ECU that it thinks you\u2019ve crashed, the ECU then passes that message along the CAN bus to another ECU that tells your airbag to deploy.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>@Progressive #Snapshot driver monitoring tool is insecure and exposes drivers to car hacking:<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FbPZ4&amp;text=%40Progressive+%23Snapshot+driver+monitoring+tool+is+insecure+and+exposes+drivers+to+car+hacking%3A\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The OBD-II port <em>used<\/em> to be the only way to plug into and communicate with the CAN bus and its ECUs. New research shows that <a href=\"https:\/\/www.kaspersky.com\/blog\/car_hacking_goes_mobile\/\" target=\"_blank\" rel=\"noopener nofollow\">this can be done wirelessly as well<\/a>.<\/p>\n<p>At any rate, Digital Bond Labs security researcher Cory Thuen got his hands on one of these Snapshot devices, which are used in some two million cars. He reverse engineered it, figured out how it worked and plugged it into his Toyota Tundra. Then determined that Snapshot does not authenticate itself nor does it encrypt its traffic, contain digital validation signatures or offer a secure boot function.<\/p>\n<p>To be clear, Snapshot devices communicate with Progressive over the cellular network in plain text. This means that an attacker, for example, could pretty easily set up a fake cell tower and perform a man-in-the-middle attack.<\/p>\n<div class=\"pullquote\">Its entirely possible that a remote hacker could inject code through a Snapshot dongle and onto the very network that controls your cars airbags and emergency brakes<\/div>\n<p>Despite these serious security lapses, the device has the capacity to communicate with the CAN bus. Therefore, its entirely possible that a remote hacker could inject code through a Snapshot dongle and onto the very network that controls your cars airbags and emergency brakes. Thuen\u2019s work stopped short of injecting code into the car\u2019s network. He claims he was merely interested in figuring out if there was any security in place to stop him from doing that.<\/p>\n<p>Before you panic, <a href=\"https:\/\/www.kaspersky.com\/blog\/podcast-protecting-cars-with-av-style-detection\/\" target=\"_blank\" rel=\"noopener nofollow\">I spoke with IOActive\u2019s director of vehicle security research<\/a> and famed car hacker, Chris Valasek, about pumping malicious code into the CAN bus last year, and he assured me that it\u2019s easier said than done.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Security<\/a> Holes in <a href=\"https:\/\/twitter.com\/progressive?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Progressive<\/a> Dongle Could Lead to Car Hacks \u2013 <a href=\"http:\/\/t.co\/4iWReok2F4\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/4iWReok2F4<\/a><\/p>\n<p>\u2014 Threatpost (@threatpost) <a href=\"https:\/\/twitter.com\/threatpost\/status\/557257225811791872?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 19, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Sure, it\u2019s possible to inject code telling your car to initiate automatic parallel park assist while you are speeding down the highway. However, your car\u2019s ECUs are processing thousands of other signals at any point while your car is in motion. So, in order to initiate automatic parallel park assist (or any other feature for that matter), the attacker would have to flood the CAN bus with enough signals to override all of the legitimate information that the car\u2019s sensors are outputting.<\/p>\n<p>Valasek and fellow researcher Charlie Miller managed to <a href=\"https:\/\/www.kaspersky.com\/blog\/car-hacking\/\" target=\"_blank\" rel=\"noopener nofollow\">manipulate seat-belt locks, brakes and steering<\/a> by flooding onboard networks with spoofed sensor signals a couple years ago. However, this process was labor intensive and Miller and Valasek, two of the brighter minds in the security industry, had a DARPA grant to work on their research.<\/p>\n<p>The good news is that not many people are doing CAN bus research. A lot of people, on the other hand, are working on browser security research. Car hacking is likely to really take off as manufacturers begin integrating browsers and other internet connected features into the cars they build and sell.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not surprisingly, one researcher realized last week that he could exploit Progressive\u2019s Snapshot driver tracking tool in order to hack into the on-board networks of certain auto-mobiles. Snapshot is a<\/p>\n","protected":false},"author":42,"featured_media":5363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[892,521,78,709],"class_list":{"0":"post-5362","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-car","9":"tag-car-hacking","10":"tag-hackers","11":"tag-research"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/progressive-snapshot-car-hacking\/5362\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/progressive-snapshot-car-hacking\/4566\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/progressive-snapshot-car-hacking\/4511\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/progressive-snapshot-car-hacking\/5067\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/progressive-snapshot-car-hacking\/6761\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/progressive-snapshot-car-hacking\/7284\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/progressive-snapshot-car-hacking\/6694\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/progressive-snapshot-car-hacking\/6761\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/progressive-snapshot-car-hacking\/7284\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/progressive-snapshot-car-hacking\/7284\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/car\/","name":"car"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5362"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5362\/revisions"}],"predecessor-version":[{"id":19183,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5362\/revisions\/19183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5363"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}