Strict Standards: Only variables should be assigned by reference in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 24

Strict Standards: Non-static method modFlexiCustomCode::parsePHPviaFile() should not be called statically in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 54

Strict Standards: Only variables should be assigned by reference in /home/noahjames7/public_html/components/com_grid/GridBuilder.php on line 29

Share This article

It’s becoming clearer that most any car is hackable. Reports before, during, and after DefCon showed that. Here’s the most recent hack news: The ubiquitous Samy Kamkar showed how his OwnStar device was adapted to get into the car via their remote iOS apps. He targeted BMW Remote, Mercedes-Benz mbrace, and Chrysler Uconnect services, all on Apple iOS.

The flaw, according to Kamkar, is the automaker’s almost childlike faith that the certificate on the remote server is valid, disregarding what kind of network provides the connection and whether it’s a legitimate remote server or one that just says it is.

How it works

Today’s car hacks: BMW, Chrysler, Mercedes-Benz on iOS OwnStar is a small Raspberry Pi PC with wireless connections in a portable carry case. The hacker puts it near the vulnerable car. When the owner issues a remote unlock or other command from an iPhone or other iOS device such as remote start, OwnStar gloms onto the exchange and grabs the logon credentials. OwnStar then mimics the owner’s remote device to access the car and has access to all the remote functions.

OwnStar uses the phone’s preference for WiFi networks to its advantage. On the AT&T mobile network, if an iOS device sees the SSID “attwifi” being broadcast by OwnStar, it attempts to pair with the OwnStar device, which happily complies as a passthrough, all the while capturing and remembering the data stream. The hacker could get into the car and start or shut down the engine, but not actually drive away.

Should be patchable

Kamkar says he’s alerted the current crop of vulnerable automakers — BMW, Mercedes, Chrysler — of the need to pitch their wireless systems. For now, in cases there are hackers in the mall parking lot, don’t use wireless access. No problem using your remote key fob; that’s safe. Probably.

Who hasn’t been hacked yet?

Today’s car hacks: BMW, Chrysler, Mercedes-Benz on iOS At the start of August, Kamkar showed how GM cars with OnStar — virtually every GM vehicle — were vulnerable. Before that, it was Chrysler again. GM was able to issue a patch to its OnStar RemoteLink in a day, and disabled the vulnerable older versions until the user updated.

In reader comment posts to many of the stories floating about this month, people who say they’ve been engineers or QA testers were often doing their work in the labs or shops with mock dashboards rather than out on the highway. In the lab, it was assumed there were no vulnerabilities (true for the lab), and they felt comfortable using commonplace passwords such as “testpass” and/or accepting any logon attempt that seemed valid. If a WiFi device SSID read “attwifi,” it was valid, they let their guard down, and didn’t protect against the dangers to the cars in real-life situations. And until Kamkar came along, the minimal defenses were enough. Not any more.

Read more http://www.extremetech.com/extreme/212251-todays-car-hacks-bmw-chrysler-mercedes-benz-on-ios


Strict Standards: Only variables should be assigned by reference in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 24

Strict Standards: Non-static method modFlexiCustomCode::parsePHPviaFile() should not be called statically in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 54

Find out more by searching for it!

Custom Search







Strict Standards: Non-static method modBtFloaterHelper::fetchHead() should not be called statically in /home/noahjames7/public_html/modules/mod_bt_floater/mod_bt_floater.php on line 21