<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Hackers Remotely Kill a Jeep on the Highway</title>
	<atom:link href="http://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 19 Apr 2026 09:12:11 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1672511</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 05:46:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1672511</guid>
		<description><![CDATA[Hackers can clone millions of Toyota, Hyundai, and Kia keys
Encryption flaws in common anti-theft feature expose vehicles from major OEMs.
https://arstechnica.com/cars/2020/03/hackers-can-clone-millions-of-toyota-hyundai-and-kia-keys/]]></description>
		<content:encoded><![CDATA[<p>Hackers can clone millions of Toyota, Hyundai, and Kia keys<br />
Encryption flaws in common anti-theft feature expose vehicles from major OEMs.<br />
<a href="https://arstechnica.com/cars/2020/03/hackers-can-clone-millions-of-toyota-hyundai-and-kia-keys/" rel="nofollow">https://arstechnica.com/cars/2020/03/hackers-can-clone-millions-of-toyota-hyundai-and-kia-keys/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1588159</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 16 Apr 2018 12:45:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1588159</guid>
		<description><![CDATA[General Motors Hires Security Team That Remotely Hacked Jeep
http://www.electronicdesign.com/automotive/general-motors-hires-security-team-remotely-hacked-jeep?PK=UM_Classics04218&amp;utm_rid=CPG05000002750211&amp;utm_campaign=16685&amp;utm_medium=email&amp;elq2=00beb49dcfe040ebb4f541d2bea6e19a

General Motors hired two security researchers that hacked into a Jeep Cherokee over the internet in 2014, cutting its transmission and disabling the brakes in an experiment that still reverberates in the automotive industry.

Chris Valasek and Charlie Miller were both hired by Cruise Automation, the autonomous driving unit that GM formed in 2016.]]></description>
		<content:encoded><![CDATA[<p>General Motors Hires Security Team That Remotely Hacked Jeep<br />
<a href="http://www.electronicdesign.com/automotive/general-motors-hires-security-team-remotely-hacked-jeep?PK=UM_Classics04218&#038;utm_rid=CPG05000002750211&#038;utm_campaign=16685&#038;utm_medium=email&#038;elq2=00beb49dcfe040ebb4f541d2bea6e19a" rel="nofollow">http://www.electronicdesign.com/automotive/general-motors-hires-security-team-remotely-hacked-jeep?PK=UM_Classics04218&#038;utm_rid=CPG05000002750211&#038;utm_campaign=16685&#038;utm_medium=email&#038;elq2=00beb49dcfe040ebb4f541d2bea6e19a</a></p>
<p>General Motors hired two security researchers that hacked into a Jeep Cherokee over the internet in 2014, cutting its transmission and disabling the brakes in an experiment that still reverberates in the automotive industry.</p>
<p>Chris Valasek and Charlie Miller were both hired by Cruise Automation, the autonomous driving unit that GM formed in 2016.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1547026</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 15 May 2017 09:33:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1547026</guid>
		<description><![CDATA[Car Security Experts Dump All Their Research and Vulnerabilities Online
http://hackaday.com/2017/05/14/car-security-experts-dump-all-their-research-and-vulnerabilities-online/

[Charlie Miller] and [Chris Valasek] Have just released all their research including (but not limited to) how they hacked a Jeep Cherokee after the newest firmware updates which were rolled out in response to their Hacking of a Cherokee in 2015.

FCA, the Corp that owns Jeep had to recall 1.5 million Cherokee’s to deal with the 2015 hack, issuing them all a patch. However the patch wasn’t all that great it actually gave [Charlie] and [Chris] even more control of the car than they had in the first place once exploited. The papers they have released are a goldmine for anyone interesting in hacking or even just messing around with cars via the CAN bus. 

We anticipate seeing an increasing number of security related releases and buzz as summer approaches. It is, after all, Network Security Theatre season.

http://illmatics.com/carhacking.html]]></description>
		<content:encoded><![CDATA[<p>Car Security Experts Dump All Their Research and Vulnerabilities Online<br />
<a href="http://hackaday.com/2017/05/14/car-security-experts-dump-all-their-research-and-vulnerabilities-online/" rel="nofollow">http://hackaday.com/2017/05/14/car-security-experts-dump-all-their-research-and-vulnerabilities-online/</a></p>
<p>[Charlie Miller] and [Chris Valasek] Have just released all their research including (but not limited to) how they hacked a Jeep Cherokee after the newest firmware updates which were rolled out in response to their Hacking of a Cherokee in 2015.</p>
<p>FCA, the Corp that owns Jeep had to recall 1.5 million Cherokee’s to deal with the 2015 hack, issuing them all a patch. However the patch wasn’t all that great it actually gave [Charlie] and [Chris] even more control of the car than they had in the first place once exploited. The papers they have released are a goldmine for anyone interesting in hacking or even just messing around with cars via the CAN bus. </p>
<p>We anticipate seeing an increasing number of security related releases and buzz as summer approaches. It is, after all, Network Security Theatre season.</p>
<p><a href="http://illmatics.com/carhacking.html" rel="nofollow">http://illmatics.com/carhacking.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1521899</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 02 Nov 2016 12:35:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1521899</guid>
		<description><![CDATA[The Story Behind Hacking the Jeep
http://www.designnews.com/author.asp?section_id=1386&amp;doc_id=281960&amp;cid=nl.x.dn14.edt.aud.dn.20161031.tst004c]]></description>
		<content:encoded><![CDATA[<p>The Story Behind Hacking the Jeep<br />
<a href="http://www.designnews.com/author.asp?section_id=1386&#038;doc_id=281960&#038;cid=nl.x.dn14.edt.aud.dn.20161031.tst004c" rel="nofollow">http://www.designnews.com/author.asp?section_id=1386&#038;doc_id=281960&#038;cid=nl.x.dn14.edt.aud.dn.20161031.tst004c</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1514160</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 20 Sep 2016 16:46:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1514160</guid>
		<description><![CDATA[Car Hacking – Chinese hacker team remotely hacked Tesla Model S 
http://securityaffairs.co/wordpress/51469/hacking/tesla-model-s-hack.html

A group of security researchers from the Chinese firm Tencent have found a series of flaws that can be exploited to remotely hack a Tesla Model S.

Security experts at the Keen Lab at Chinese firm Tencent have found a series of vulnerabilities that can be exploited by a remote attacker to hack an unmodified Tesla Model S.

The researchers demonstrated that it is possible to hack the Tesla Model S while it is parked or if it is on the move.

The most scaring part of the hack is when the car is on the move, the hackers were able to activate the brakes from 12 miles, activate the windshield wipers, fold the side view mirrors, and open the trunk.

The researchers are the first team of hackers that is able to compromise CAN Bus to remote control Tesla cars by exploiting a series of flaws.]]></description>
		<content:encoded><![CDATA[<p>Car Hacking – Chinese hacker team remotely hacked Tesla Model S<br />
<a href="http://securityaffairs.co/wordpress/51469/hacking/tesla-model-s-hack.html" rel="nofollow">http://securityaffairs.co/wordpress/51469/hacking/tesla-model-s-hack.html</a></p>
<p>A group of security researchers from the Chinese firm Tencent have found a series of flaws that can be exploited to remotely hack a Tesla Model S.</p>
<p>Security experts at the Keen Lab at Chinese firm Tencent have found a series of vulnerabilities that can be exploited by a remote attacker to hack an unmodified Tesla Model S.</p>
<p>The researchers demonstrated that it is possible to hack the Tesla Model S while it is parked or if it is on the move.</p>
<p>The most scaring part of the hack is when the car is on the move, the hackers were able to activate the brakes from 12 miles, activate the windshield wipers, fold the side view mirrors, and open the trunk.</p>
<p>The researchers are the first team of hackers that is able to compromise CAN Bus to remote control Tesla cars by exploiting a series of flaws.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1510162</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Aug 2016 10:37:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1510162</guid>
		<description><![CDATA[Hackers arrested after stealing more than 30 Jeeps in Texas
Thieves used FCA DealerCONNECT software to carry out their crimes.
http://www.autoblog.com/2016/08/04/hackers-steal-30-jeeps-houston-texas/

It seems the news regarding vehicle hacking continues to get worse, especially when it comes to products from Fiat Chrysler Automobiles. Last year, a Jeep Cherokee in St. Louis, Missouri, was wirelessly hacked from Pittsburgh. Nissan had to shut down its Leaf app because of vulnerabilities. Now, a pair of hackers in Houston, Texas, stole more than 30 Jeeps over a six-month period. The two were arrested by police last Friday while attempting to steal another vehicle.]]></description>
		<content:encoded><![CDATA[<p>Hackers arrested after stealing more than 30 Jeeps in Texas<br />
Thieves used FCA DealerCONNECT software to carry out their crimes.<br />
<a href="http://www.autoblog.com/2016/08/04/hackers-steal-30-jeeps-houston-texas/" rel="nofollow">http://www.autoblog.com/2016/08/04/hackers-steal-30-jeeps-houston-texas/</a></p>
<p>It seems the news regarding vehicle hacking continues to get worse, especially when it comes to products from Fiat Chrysler Automobiles. Last year, a Jeep Cherokee in St. Louis, Missouri, was wirelessly hacked from Pittsburgh. Nissan had to shut down its Leaf app because of vulnerabilities. Now, a pair of hackers in Houston, Texas, stole more than 30 Jeeps over a six-month period. The two were arrested by police last Friday while attempting to steal another vehicle.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1480061</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 19 Mar 2016 07:36:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1480061</guid>
		<description><![CDATA[Andy Greenberg / Wired: 	  
FBI, Department of Transportation, and National Highway Traffic Safety Administration warn drivers about threat of over-the-internet attacks on cars  —  The FBI Warns That Car Hacking Is a Real Risk  —  It&#039;s been eight months since a pair of security researchers proved beyond any doubt … 

The FBI Warns That Car Hacking Is a Real Risk
http://www.wired.com/2016/03/fbi-warns-car-hacking-real-risk/

It’s been eight months since a pair of security researchers proved beyond any doubt that car hacking is more than an action movie plot device when they remotely killed the transmission of a 2014 Jeep Cherokee as I drove it down a St. Louis highway. Now the FBI has caught up with that news, and it’s warning Americans to take the risk of vehicular cybersabotage seriously.

In a public service announcement issued together with the Department of Transportation and the National Highway Traffic and Safety Administration, the FBI on Thursday released a warning to drivers about the threat of over-the-internet attacks on cars and trucks. The announcement doesn’t reveal any sign that the agencies have learned about incidents of car hacking that weren’t already public. But it cites all of last year’s car hacking research to offer a list of tips about how to keep vehicles secure from hackers and recommendations about what to do if you believe your car has been hacked—including a request to notify the FBI.

“Modern motor vehicles often include new connected vehicle technologies that aim to provide benefits such as added safety features, improved fuel economy, and greater overall convenience,” the PSA reads. “Aftermarket devices are also providing consumers with new features to monitor the status of their vehicles. However, with this increased connectivity, it is important that consumers and manufacturers maintain awareness of potential cyber security threats.”]]></description>
		<content:encoded><![CDATA[<p>Andy Greenberg / Wired:<br />
FBI, Department of Transportation, and National Highway Traffic Safety Administration warn drivers about threat of over-the-internet attacks on cars  —  The FBI Warns That Car Hacking Is a Real Risk  —  It&#8217;s been eight months since a pair of security researchers proved beyond any doubt … </p>
<p>The FBI Warns That Car Hacking Is a Real Risk<br />
<a href="http://www.wired.com/2016/03/fbi-warns-car-hacking-real-risk/" rel="nofollow">http://www.wired.com/2016/03/fbi-warns-car-hacking-real-risk/</a></p>
<p>It’s been eight months since a pair of security researchers proved beyond any doubt that car hacking is more than an action movie plot device when they remotely killed the transmission of a 2014 Jeep Cherokee as I drove it down a St. Louis highway. Now the FBI has caught up with that news, and it’s warning Americans to take the risk of vehicular cybersabotage seriously.</p>
<p>In a public service announcement issued together with the Department of Transportation and the National Highway Traffic and Safety Administration, the FBI on Thursday released a warning to drivers about the threat of over-the-internet attacks on cars and trucks. The announcement doesn’t reveal any sign that the agencies have learned about incidents of car hacking that weren’t already public. But it cites all of last year’s car hacking research to offer a list of tips about how to keep vehicles secure from hackers and recommendations about what to do if you believe your car has been hacked—including a request to notify the FBI.</p>
<p>“Modern motor vehicles often include new connected vehicle technologies that aim to provide benefits such as added safety features, improved fuel economy, and greater overall convenience,” the PSA reads. “Aftermarket devices are also providing consumers with new features to monitor the status of their vehicles. However, with this increased connectivity, it is important that consumers and manufacturers maintain awareness of potential cyber security threats.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1475952</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 27 Feb 2016 16:37:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1475952</guid>
		<description><![CDATA[Chris Ziegler / The Verge:
Nissan pulls the Leaf&#039;s phone app after security vulnerabilities come to light
http://www.theverge.com/2016/2/25/11116724/nissan-nissanconnect-app-hack-offline

Just a day after news spread that Nissan Leaf&#039;s NissanConnect app could be compromised by hackers to control fan settings (potentially draining the battery) and download logs of past drives, Nissan has pulled the functionality, saying that it is &quot;looking forward to launching updated versions of [its] apps very soon.&quot;

Information security has been a particularly pressing concern in the auto industry, where the concept of the connected car has, at times, moved faster than the industry&#039;s ability to keep hackers at bay. The NissanConnect hack, which allows an individual to download and manipulate settings if they have a Leaf&#039;s VIN number, is not the most serious hack — there doesn&#039;t appear to be any situation where it would put a moving vehicle in harm&#039;s way — but it could effectively disable a car by draining the battery. In the worst case, hackers could also use drive logs to get a sense of when the car&#039;s owner is at home, at work, or elsewhere.]]></description>
		<content:encoded><![CDATA[<p>Chris Ziegler / The Verge:<br />
Nissan pulls the Leaf&#8217;s phone app after security vulnerabilities come to light<br />
<a href="http://www.theverge.com/2016/2/25/11116724/nissan-nissanconnect-app-hack-offline" rel="nofollow">http://www.theverge.com/2016/2/25/11116724/nissan-nissanconnect-app-hack-offline</a></p>
<p>Just a day after news spread that Nissan Leaf&#8217;s NissanConnect app could be compromised by hackers to control fan settings (potentially draining the battery) and download logs of past drives, Nissan has pulled the functionality, saying that it is &#8220;looking forward to launching updated versions of [its] apps very soon.&#8221;</p>
<p>Information security has been a particularly pressing concern in the auto industry, where the concept of the connected car has, at times, moved faster than the industry&#8217;s ability to keep hackers at bay. The NissanConnect hack, which allows an individual to download and manipulate settings if they have a Leaf&#8217;s VIN number, is not the most serious hack — there doesn&#8217;t appear to be any situation where it would put a moving vehicle in harm&#8217;s way — but it could effectively disable a car by draining the battery. In the worst case, hackers could also use drive logs to get a sense of when the car&#8217;s owner is at home, at work, or elsewhere.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1445827</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 23 Oct 2015 11:13:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1445827</guid>
		<description><![CDATA[CAN Bus Can Be Encrypted, Says Trillium
http://www.eetimes.com/document.asp?doc_id=1328081&amp;

Until the recent wave of carmakers rolling out more and more connected cars for the consumer market, cyber security was always a matter of indifference to car OEMs and Tier Ones. Now, it’s a big deal.

Fresh in everyone’s memory are several celebrated hacking incidents this past summer. These include the vulnerabilities found in Chrysler Jeeps, which resulted in Chrysler’s recall of 1.4 million vehicles, and a flaw in General Motors’ OnStar RemoteLink system, through which a hacker found a way to remotely unlock doors and start engines.

As Egil Juliussen, director research &amp; principal analyst at IHS Automotive, pointed out in a recent presentation to the automotive industry, “Hacking research has shown that nearly all access points can be compromised.” To cope with this reality, technology suppliers are beginning to launch a number of cyber security solutions, he said. They range from hardware security to CAN (Controller Area Network) bus firewalls and ECU software monitoring.

But what the world hasn’t seen yet – and Juliussen hasn’t seen either – is a technology capable of encrypting CAN bus itself.

That’s about to change, according to Trillium, a Japan-based start-up headed by David Uze, former CEO of Freescale Japan. Uze told EE Times this week that a small team of Trillium engineers has developed what it calls SecureCAN -- “a CAN bus encryption and key management system for protecting payloads less than 8bytes.” 

Essential to this assertion is a claimed ability to handle data “in 8bytes,” instead of the 128-bit block the Rijndael algorithm needs for AES-based encryptions.

Essential to this assertion is a claimed ability to handle data “in 8bytes,” instead of the 128-bit block the Rijndael algorithm needs for AES-based encryptions.

Because of its ultra-light weight block cipher, Trillium’s SecureCAN can encrypt CAN (and LIN) messages in real time, claimed Uze.]]></description>
		<content:encoded><![CDATA[<p>CAN Bus Can Be Encrypted, Says Trillium<br />
<a href="http://www.eetimes.com/document.asp?doc_id=1328081&#038;amp" rel="nofollow">http://www.eetimes.com/document.asp?doc_id=1328081&#038;amp</a>;</p>
<p>Until the recent wave of carmakers rolling out more and more connected cars for the consumer market, cyber security was always a matter of indifference to car OEMs and Tier Ones. Now, it’s a big deal.</p>
<p>Fresh in everyone’s memory are several celebrated hacking incidents this past summer. These include the vulnerabilities found in Chrysler Jeeps, which resulted in Chrysler’s recall of 1.4 million vehicles, and a flaw in General Motors’ OnStar RemoteLink system, through which a hacker found a way to remotely unlock doors and start engines.</p>
<p>As Egil Juliussen, director research &amp; principal analyst at IHS Automotive, pointed out in a recent presentation to the automotive industry, “Hacking research has shown that nearly all access points can be compromised.” To cope with this reality, technology suppliers are beginning to launch a number of cyber security solutions, he said. They range from hardware security to CAN (Controller Area Network) bus firewalls and ECU software monitoring.</p>
<p>But what the world hasn’t seen yet – and Juliussen hasn’t seen either – is a technology capable of encrypting CAN bus itself.</p>
<p>That’s about to change, according to Trillium, a Japan-based start-up headed by David Uze, former CEO of Freescale Japan. Uze told EE Times this week that a small team of Trillium engineers has developed what it calls SecureCAN &#8212; “a CAN bus encryption and key management system for protecting payloads less than 8bytes.” </p>
<p>Essential to this assertion is a claimed ability to handle data “in 8bytes,” instead of the 128-bit block the Rijndael algorithm needs for AES-based encryptions.</p>
<p>Essential to this assertion is a claimed ability to handle data “in 8bytes,” instead of the 128-bit block the Rijndael algorithm needs for AES-based encryptions.</p>
<p>Because of its ultra-light weight block cipher, Trillium’s SecureCAN can encrypt CAN (and LIN) messages in real time, claimed Uze.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/07/23/hackers-remotely-kill-a-jeep-on-the-highway/comment-page-1/#comment-1437210</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 21 Sep 2015 14:27:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=33248#comment-1437210</guid>
		<description><![CDATA[News &amp; Analysis
Hacked Jeep: Whom to Blame?
http://www.eetimes.com/document.asp?doc_id=1327266&amp;

 So, where, exactly, did hackers find a crack in the firewall of a 2014 Jeep Cherokee? How did they infiltrate it and who’s at fault for failing to foresee the breach?

The failure apparently occurred in not one, but multiple places in the connected car’s system architecture. Blame, according to multiple automotive industry analysts, could also extend to parties beyond Fiat Chrysler Automobiles (FCA). They include Sprint — a system integrator — with whom Chrysler contracted for secure vehicle network access via the telematics control unit, and Harman Kardon, who designed an in-vehicle infotainment system.

The hackers were reportedly able to control a 2014 Jeep Cherokee&#039;s steering, braking, high beams, turn signals, windshield wipers and fluid, and door locks, as well as reset the speedometer and tachometer, kill the engine, and disengage the transmission so the accelerator pedal failed. Most important, they did all this mischief remotely and wirelessly.

Breakdown of security vulnerability
Asked to break down the security vulnerability of the hacked car, Lanctot said: “Step one is control of braking, acceleration and steering accessible on the vehicle CAN bus.

“Step two is remote wireless connectivity to the car via cellular.

“Step three is providing for remote access to the CAN bus via the telematics control unit interface. Clearly, the FCA systems were configured in such a way as to allow for CAN bus access via the telematics control unit.”

Lanctot added, “There is nothing wrong with that as long as you provide for appropriate security.”

Lanctot, however, pointed out, “It appears that the IP address was too easily identified” by the system used by Jeep Cherokee and “the telematics control unit lacked basic software upgrading capability.”

Lanctot isn’t alone in fingering the IP address issue. Egil Juliussen, director research &amp; principal analyst at IHS Automotive Technology, also told us that the hackers appear to have found “a simple way to get the IP address of a car.]]></description>
		<content:encoded><![CDATA[<p>News &amp; Analysis<br />
Hacked Jeep: Whom to Blame?<br />
<a href="http://www.eetimes.com/document.asp?doc_id=1327266&#038;amp" rel="nofollow">http://www.eetimes.com/document.asp?doc_id=1327266&#038;amp</a>;</p>
<p> So, where, exactly, did hackers find a crack in the firewall of a 2014 Jeep Cherokee? How did they infiltrate it and who’s at fault for failing to foresee the breach?</p>
<p>The failure apparently occurred in not one, but multiple places in the connected car’s system architecture. Blame, according to multiple automotive industry analysts, could also extend to parties beyond Fiat Chrysler Automobiles (FCA). They include Sprint — a system integrator — with whom Chrysler contracted for secure vehicle network access via the telematics control unit, and Harman Kardon, who designed an in-vehicle infotainment system.</p>
<p>The hackers were reportedly able to control a 2014 Jeep Cherokee&#8217;s steering, braking, high beams, turn signals, windshield wipers and fluid, and door locks, as well as reset the speedometer and tachometer, kill the engine, and disengage the transmission so the accelerator pedal failed. Most important, they did all this mischief remotely and wirelessly.</p>
<p>Breakdown of security vulnerability<br />
Asked to break down the security vulnerability of the hacked car, Lanctot said: “Step one is control of braking, acceleration and steering accessible on the vehicle CAN bus.</p>
<p>“Step two is remote wireless connectivity to the car via cellular.</p>
<p>“Step three is providing for remote access to the CAN bus via the telematics control unit interface. Clearly, the FCA systems were configured in such a way as to allow for CAN bus access via the telematics control unit.”</p>
<p>Lanctot added, “There is nothing wrong with that as long as you provide for appropriate security.”</p>
<p>Lanctot, however, pointed out, “It appears that the IP address was too easily identified” by the system used by Jeep Cherokee and “the telematics control unit lacked basic software upgrading capability.”</p>
<p>Lanctot isn’t alone in fingering the IP address issue. Egil Juliussen, director research &amp; principal analyst at IHS Automotive Technology, also told us that the hackers appear to have found “a simple way to get the IP address of a car.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
