Research: Vulnerabilities of the cryptotransponder allow to start more than 100 machine models without a key



    Back in 2012, European researchers found serious vulnerabilities in the Megamos cryptotransponder, which is installed in more than 100 models of cars of different manufacturers (Audi, Ferrari, Cadillac, Volkswagen, etc.). The security errors they found allowed attackers to start cars with the keyless entry autorun function.



    Megamos cryptotransponder in the auto-key

    Researchers managed to circumvent all the proprietary transponder security mechanisms, including encryption and authentication protocol, and implement three practical attack vectors that allow one to find out the device's 96-bit secret key.



    Authentication Procedure Diagram

    During one of the attacks, they managed to start the car with the help of a device emulating a transponder in just half an hour. It is almost impossible to resist another attack if the attacker has access to the car and the transponder at least for a short time (which is possible when renting a car or using jack parking ).



    The list of vulnerable cars

    At the same time, as reportedNet Security Edition, security experts have managed to publish their study just now due to opposition from automakers. So, in 2013, their performance at the USENIX Security Symposium was blocked by Volkswagen, which appealed to the UK Supreme Court and secured a ban on the publication of key sections of the study. Now, the USENIX organizing committee has received permission to publish a version of the work, which omits information that could allow attacks to be carried out by attackers without deep technical skills.

    Recently, the topic of car information security has arisen quite often. So in July 2015, the automaker Land Rover announcedrecall of more than 65,000 machines, the software of which contained an error, leading to spontaneous unlocking of the doors.

    In addition, two researchers, using a practical example, showed the Wired journalist the possibility of various attacks, including remote control of the brakes and gearbox of a car traveling on a highway in another state.

    The 2014 Jeep Cherookee was equipped with the FCA Uconnect system, which connects to the Sprint mobile network. Information security experts used a bug in Uconnect, which allows hacking cars at any distance (it was originally planned that control could be captured within 100 meters of direct-WiFi).

    Due to the vulnerability in Uconnect, they were able to obtain GPS coordinates, identification number, model, release date and IP address of cars traveling nearby.

    During one of the demonstrations, the researchers remotely took control of the Cherokee jeep, control the wipers, the washer pump, the steering wheel, and the brakes. As a result, the jeep was sent to the ditch.



    As a result, Chrysler released the patch and decided to recall more than 1.4 million cars. In addition, information about several vulnerabilities in the Tesla Model S electric car (which were later fixed) got to the press .

    Earlier this year, BT launched an initiative to help automakers find out if their cars are susceptible to cyber attacks.

    Car theft is not the only thing that may be of interest to intruders. Another popular activity is the unlocking of some functions of the car, available only in more expensive trim levels. In 2013, at the information security forum PHDays, Kirill Ermakov and Dmitry Sklyarov spokehacking the ECU (Electronic Control Unit) microcontroller to unlock features that maximize the effectiveness of the car’s systems. The slides of this presentation can be viewed here .

    Also popular now: