Fiat
Chrysler Cyber Risk Recall of 1.4M Vehicles Seen as Industry
First
July
26, 2015 by Jeff Plungis and Mark Clothier
Fiat Chrysler Automobiles NV is recalling
about 1.4 million cars and trucks equipped with radios that are vulnerable to
hacking, the first formal safety campaign in response to a cybersecurity
threat.
The move marks a milestone for the
industry, which last year set a record with 64 million autos called back for
fixes in the U.S. The National Highway Traffic Safety Administration, under fire
from Congress for not catching defects more quickly, has been considering
punitive action against Fiat Chrysler for failing to protect vehicle
owners.
Unauthorized remote access to certain
vehicle systems was blocked with a network-level improvement on July 23, the
company said in a statement. In addition, affected customers will receive a USB
device to upgrade vehicles’ software with internal safety
features.
Fiat Chrysler was already distributing
software to insulate some connected vehicles from illegal remote manipulation
after Wired magazine published a story about software
programmers who were able to take over a Jeep Cherokee being driven on a
Missouri highway.
The company, led by Chief Executive
Officer Sergio Marchionne, reiterated that it’s not aware of any real-world
unauthorized remote hack into any of its vehicles. It stressed that no defect
was found and said it’s conducting the campaign out of “an abundance of
caution.”
NHTSA said it encouraged the action to
protect consumers against a vulnerability that could affect a driver’s
control.
Expanded
Action
“Launching a recall is the right step to
protect Fiat Chrysler’s customers, and it sets an important precedent for how
NHTSA and the industry will respond to cybersecurity vulnerabilities,” NHTSA
Administrator Mark Rosekind said in a statement Friday.
The recall covers about a million more
cars and trucks than those initially identified as needing a software patch. The
action includes 2015 versions of Ram pickups, Jeep Cherokee and Grand Cherokee
SUVs, Dodge Challenger sports coupes and Viper supercars.
“That’s not a small number to go after,”
Mark Boyadjis, an analyst with IHS Automotive, said in a telephone interview.
“This is a pretty quick response and much of it could be P.R. driven. But I
think it will keep consumers comfortable and prevent current ones and future
ones from straying away from the brand.”
This isn’t the first time automobiles
have been shown to be vulnerable to hacking. What elevates this instance is that
researchers were able to find and disable vehicles from miles away over the
cellular network that connects to the vehicles’ entertainment and navigation
systems.
That capability makes the possibility of
remote hacking of cars a reality. Earlier hacks have mostly been achieved by
jacking the researchers’ laptops into diagnostic ports inside the
cars.
Fiat Chrysler’s UConnect infotainment
system uses Sprint Corp.’s wireless network.
“This is not a Sprint issue but we have
been working with Chrysler to help them further secure their vehicles,” said
Stephanie Vinge Walsh, a Sprint spokeswoman.
NHTSA said it would open an investigation
of the remedy “to ensure that the scope of the recall is correct and that the
remedy will be effective,” agency spokesman Gordon Trowbridge said in an
e-mailed statement. The agency said its electronics and cybersecurity experts
will continue to monitor hacking threats and take action when
necessary.
Consumer
Confidence
There’s a possibility the recall could
affect consumer confidence in Fiat Chrysler, even though the company isn’t the
only one with cybersecurity challenges, said Thilo Koslowski, vice president and
automotive practice leader at technology consultant Gartner
Inc.
“It validates that cyber-hacking with
cars is a serious issue that the auto industry must pay attention to,” he said.
“The auto industry needs to develop new technology to combat these technological
problems.”
General Motors Co. has a team working on
cybersecurity and has hired Harris Corp.’s Exelis and other firms to develop
anti- hacking systems, said Mark Reuss, the Detroit automaker’s executive vice
president for global product development. GM seeks to block hackers’ access to
its autos, he said, and if they do get in, it tries to prevent them from gaining
control.
“It’s probably one of the most important
things we spend time on,” Reuss said. “Anyone who wants to do something like
that will probably get on, so you have to look at what happens when they
do.”
Proposed
Legislation
GM has also worked with the U.S. military
and with Boeing Co. on its anti-hacking systems, he said.
Senators Edward Markey of Massachusetts
and Richard Blumenthal of Connecticut, both Democrats, introduced legislation on
July 21 that would direct NHTSA and the Federal Trade Commission to establish
rules to secure cars and protect consumer privacy.
The senators’ bill would also establish a
rating system to inform owners about how secure their vehicles are beyond any
minimum federal requirements. The lawmakers released a report in 2014 on gaps in
car-security systems, concluding that only two of 16 automakers had the ability
to detect and respond to a hacking attack.
Markey questioned why it took nine months
after learning about the security gap for Fiat Chrysler to order a
recall.
‘No
Assurances’
“There are no assurances that these
vehicles are the only ones that are this unprotected from cyberattack,” he said
Friday in an e-mail. “A safe and fully equipped vehicle should be one that is
equipped to protect drivers from hackers and thieves.”
Although general cyber threats have been
acknowledged previously by the industry, the specific ability to take control of
critical vehicle functions in the affected Fiat Chrysler vehicles only became
clear with the Wired magazine
report, said Fiat Chrysler spokesman Eric Mayne.
“Prior to this month, the precise means
of the demonstrated manipulation was not known,” Mayne
said.
Representatives Fred Upton and Frank
Pallone, leaders of the House Energy and Commerce Committee, sent letters to 17
manufacturers and NHTSA in May to gather information about how the industry is
addressing cybersecurity.
“As the underlying technologies seemingly
evolve by the day, so too must our manufacturers and regulators keep pace to
protect drivers from these growing threats,” the Michigan Republican and New
Jersey Democrat said in a statement Friday.
(By Bloomberg Reporters Mark Clothier and
Jeff Plungis; with assistance from Patrick Ralph in New York, David Welch in
Southfield, Michigan, and Jordan Robertson in Washington.)
Copyright 2015
Bloomberg.
Hackers Remotely Kill a Jeep on the Highway—With Me in It
Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started blasting cold air at the maximum setting, chilling the sweat on my back through the in-seat climate control system. Next the radio switched to the local hip hop station and began blaring Skee-lo at full volume. I spun the control knob left and hit the power button, to no avail. Then the windshield wipers turned on, and wiper fluid blurred the glass.
As I tried to cope with all this, a picture of the two hackers performing these stunts appeared on the car’s digital display: Charlie Miller and Chris Valasek, wearing their trademark track suits. A nice touch, I thought.
The Jeep’s strange behavior wasn’t entirely unexpected. I’d come to St. Louis to be Miller and Valasek’s digital crash-test dummy, a willing subject on whom they could test the car-hacking research they’d been doing over the past year. The result of their work was a hacking technique—what the security industry calls a zero-day exploit—that can target Jeep Cherokees and give the attacker wireless control, via the Internet, to any of thousands of vehicles. Their code is an automaker’s nightmare: software that lets hackers send commands through the Jeep’s entertainment system to its dashboard functions, steering, brakes, and transmission, all from a laptop that may be across the country.
To better simulate the experience of driving a vehicle while it’s being hijacked by an invisible, virtual force, Miller and Valasek refused to tell me ahead of time what kinds of attacks they planned to launch from Miller’s laptop in his house 10 miles west. Instead, they merely assured me that they wouldn’t do anything life-threatening. Then they told me to drive the Jeep onto the highway. “Remember, Andy,” Miller had said through my iPhone’s speaker just before I pulled onto the Interstate 64 on-ramp, “no matter what happens, don’t panic.”1
Immediately my accelerator stopped working. As I frantically pressed the pedal and watched the RPMs climb, the Jeep lost half its speed, then slowed to a crawl. This occurred just as I reached a long overpass, with no shoulder to offer an escape. The experiment had ceased to be fun.
At that point, the interstate began to slope upward, so the Jeep lost more momentum and barely crept forward. Cars lined up behind my bumper before passing me, honking. I could see an 18-wheeler approaching in my rearview mirror. I hoped its driver saw me, too, and could tell I was paralyzed on the highway.
“You’re doomed!” Valasek shouted, but I couldn’t make out his heckling over the blast of the radio, now pumping Kanye West. The semi loomed in the mirror, bearing down on my immobilized Jeep.
I followed Miller’s advice: I didn’t panic. I did, however, drop any semblance of bravery, grab my iPhone with a clammy fist, and beg the hackers to make it stop.
For the rest of this article, please visit: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.