Drawing Lessons From July’s Jeep Hack

Comment

Image Credits: Matt Swaim (opens in a new window) / Flickr (opens in a new window) under a CC BY-ND 2.0 (opens in a new window) license.

Jessy Irwin

Contributor
Jessy Irwin is a security advocate and communications professional specializing in information security, privacy and trust.

If you were anywhere near the internet in late July, you probably read the news: Charlie Miller and Chris Valasek, two security researchers who specialize in hacking cars, figured out how to remotely take control of a Jeep.

They didn’t just take control of the vehicle from ten miles away— the hacking duo exploited a software flaw that shut down the Jeep’s engine while Wired’s Andy Greenberg was driving it. On a busy stretch of public highway where cars whizzed by at 60+ miles per hour. Without a shoulder or emergency pull off lane.

“THEY DID WHAAAAAAAAT?” most of the internet asked, mouths agape while watching the video proof that this was all possible.

Though the piece was masterful, the experiment was an entirely insane trust exercise in which two hackers promised not to put Greenberg’s life in danger while exploiting a security hole in the car’s uConnect system. Weeks later most of the internet was still discussing their shenanigans, and Chrysler announced a recall for 1.4 million vehicles, almost three times the number originally estimated by Miller, a Twitter employee, and Valasek, head of vehicle research at security firm IOActive.

Automakers and technology companies have worked together to connect cars to the internet left and right— there is no shortage of solutions for the connected car on the market, some of which can even unlock your home for you. How is it that major car companies across the world are just now beginning to hire security teams?

Security by Design

If one thing is certain about security, it’s this: security is a fundamental that has to be built in from the very beginning of the product creation process— it cannot be effectively reverse-engineered in at the end. When we design houses, we don’t put the toilet in the middle of the kitchen next to the sink— and when dealing with critical and non-critical systems, isolation is key for strong security.

To prevent an attacker from using a non-critical network to gain access to a highly critical network, security professionals often implement an air gap between the two. In the case of the systems powering the hacked Jeep, however, an air gap didn’t exist: after combining a few different security vulnerabilities, the hackers discovered a link between the system driving the car and the uConnect system powering the dashboard entertainment unit. One SIM card vulnerability and a few hacks later, the potentially fatal remote takeover flaw went from being a theoretical attack to a plausible threat.

Ultimately, this raises many questions about Chrysler’s security, design and review processes— someone (or multiple someones) within Chrysler had the opportunity to spot and correct this flaw, and did no such thing. How could something so glaringly obvious have been missed in something as critical and powerful as an automobile? Who could have thought that connecting these systems was a sound choice in the first place?!

Disclosure is hard

According to cybersecurity advocate Keren Elezari, “Hackers are the immune system of the internet.” As part of that immune system, white hat hackers and security researchers search for vulnerabilities in the critical infrastructures that connect our world, and disclose them as a means to protect vital systems from malicious attack. For this coordinated or responsible disclosure to work, vendors and security researchers must collaborate to find a fix and improve software or device security together.

More often than not, however, disclosure is a risky process for security researchers, and many are threatened with legal action for simply pointing out a flaw to a vendor. Since the 1990s, countless researchers have been threatened with prosecution for attempting to report software holes that are equally accessible by criminals, and more often than not, their findings are downplayed when vulnerabilities are released in the wild.

 

Though this is slowly beginning to change as large technology companies embrace disclosure and adopt platforms like Bugcrowd and HackerOne for vulnerability management, it is still common for researchers to face threats, or to have to approach the media and raise awareness of a security issue for it to be appropriately fixed.

While some consider this to be a dangerous act of stunt hacking, this particular case of car hacking is an example of public vulnerability disclosure at its absolute best. Instead of releasing the vulnerability into the wild,  Miller and Valasek coordinated with the vendor once they found the exploit, and then waited to make their findings public until a fix was available.

Without a video to illustrate the severity and implications of their car hack, their findings might have never been heard outside of the security community in attendance at BlackHat: a patch for the flaw may have never been developed. This summer, there are many more car hacks on the horizon at the world’s largest gathering of hackers and infosec pros BlackHat and DEF CON. (No word yet on whether any of the researchers behind this summer’s round of car hacks are working with reporters on videos of their vulnerability exploits, too!)

Bridging the Last Mile

After sharing their severe vulnerability with Chrysler, Miller and Valasek committed to the time consuming task of collaborating with the car manufacturer to develop a patch for the issue. Using an algorithm for tagging and tracking wild animals, Miller and Valasek estimated that 471k cars were affected— but after the recall from Chrysler, we now know that Chrysler will attempt to ship 1.4 million USB drives preloaded with software updates to consumers. If we know anything about consumers, though, it’s this: consumers don’t regularly update software for their computers, much less their cars.

Updating car software (which can be downloaded here) isn’t a simple process— it requires that the driver take the car to the dealership, or download the software from the web, upload it onto a thumb drive, connect the thumb drive to a USB port in the car’s dashboard, and then go through the installation process in the vehicle.

While this task might be reasonable for a certain subset of tech-savvy drivers, the vast majority of people will not go through this process, meaning many of the vehicles vulnerable to remote hacking may never see this upgrade. (Since the breach, Sprint has implemented upgrades that prevent the attack from being launched on their network, too.)

What good is a security update if it can’t make its way from a manufacturer to the device with a highly critical security issue? If Chrysler knew about this issue for nine months, why did it take three days from the initial public disclosure to announce a recall? And why is the burden of updating being left on the end-user when it the system could have been designed from the outset to automatically deliver important updates directly to affected vehicles?

Mo’ connectivity, mo’ problems

When their structures fail or their designs are found to be faulty, architects and civil engineers are frequently deemed negligent and held liable for decisions that lead to loss of life and limb. The Internet of Things is expected to grow to 30 billion devices by 2020, and as technology begins to power more and more of the things we use in our daily lives, we are quickly approaching world where technologists will be held liable for the loss of life and limb, too.

Whether you agree or not with how Charlie, Chris and Andy worked together to demonstrate a vulnerability affecting 1.5 million cars on the road does not change the severity of the issue or its widespread implications for consumers. By adding connectivity to devices, we greatly expand the potential for security vulnerabilities— with more connectivity comes more security problems.

Make room for it at the beginning of your product development process and embrace the security researchers who step in and share insights that will harden your product against abuse and malicious attack. In the end, it could do more than just save your company’s reputation from massive heartache— it could save life and limb.

Though no technology will ever be unhackable or 100% secure, security and security researchers serve to protect end users and empower the innovation we love so much in the Silicon Valley. To prevent the future from becoming a fully connected Internet of Terrors, it is time for those of us building an always-on, omni-connected future to be more proactive about the choices we make for the consumers that trust us to protect their safety.

More TechCrunch

Tags

Featured Article

In 2024, many Y Combinator startups only want tiny seed rounds — but there’s a catch

When Bowery Capital general partner Loren Straub started talking to a startup from the latest Y Combinator accelerator batch a few months ago, she thought it was strange that the company didn’t have a lead investor for the round it was raising. Even stranger, the founders didn’t seem to be…

1 hour ago
In 2024, many Y Combinator startups only want tiny seed rounds — but there’s a catch

The keynote will be focused on Apple’s software offerings and the developers that power them, including the latest versions of iOS, iPadOS, macOS, tvOS, visionOS and watchOS.

Watch Apple kick off WWDC 2024 right here

Welcome to Startups Weekly — Haje’s weekly recap of everything you can’t miss from the world of startups. Anna will be covering for him this week. Sign up here to…

Startups Weekly: Ups, downs, and silver linings

HSBC and BlackRock estimate that the Indian edtech giant Byju’s, once valued at $22 billion, is now worth nothing.

BlackRock has slashed the value of stake in Byju’s, once worth $22 billion, to zero

Apple is set to board the runaway locomotive that is generative AI at next week’s World Wide Developer Conference. Reports thus far have pointed to a partnership with OpenAI that…

Apple’s generative AI offering might not work with the standard iPhone 15

LinkedIn has confirmed it will no longer allow advertisers to target users based on data gleaned from their participation in LinkedIn Groups. The move comes more than three months after…

LinkedIn to limit targeted ads in EU after complaint over sensitive data use

Founders: Need plans this weekend? What better way to spend your time than applying to this year’s Startup Battlefield 200 at TechCrunch Disrupt. With Monday’s deadline looming, this is a…

Startup Battlefield 200 applications due Monday

The company is in the process of building a gigawatt-scale factory in Kentucky to produce its nickel-hydrogen batteries.

Novel battery manufacturer EnerVenue is raising $515M, per filing

Meta is quietly rolling out a new “Communities” feature on Messenger, the company confirmed to TechCrunch. The feature is designed to help organizations, schools and other private groups communicate in…

Meta quietly rolls out Communities on Messenger

Featured Article

Siri and Google Assistant look to generative AI for a new lease on life

Voice assistants in general are having an existential moment, and generative AI is poised to be the logical successor.

8 hours ago
Siri and Google Assistant look to generative AI for a new lease on life

Education software provider PowerSchool is being taken private by investment firm Bain Capital in a $5.6 billion deal.

Bain to take K-12 education software provider PowerSchool private in $5.6B deal

Shopify has acquired Threads.com, the Sequoia-backed Slack alternative, Threads said on its website. The companies didn’t disclose the terms of the deal but said that the Threads.com team will join…

Shopify acquires Threads (no, not that one)

Featured Article

Bangladeshi police agents accused of selling citizens’ personal information on Telegram

Two senior police officials in Bangladesh are accused of collecting and selling citizens’ personal information to criminals on Telegram.

19 hours ago
Bangladeshi police agents accused of selling citizens’ personal information on Telegram

Carta, a once-high-flying Silicon Valley startup that loudly backed away from one of its businesses earlier this year, is working on a secondary sale that would value the company at…

Carta’s valuation to be cut by $6.5 billion in upcoming secondary sale

Boeing’s Starliner spacecraft has successfully delivered two astronauts to the International Space Station, a key milestone in the aerospace giant’s quest to certify the capsule for regular crewed missions.  Starliner…

Boeing’s Starliner overcomes leaks and engine trouble to dock with ‘the big city in the sky’

Rivian needs to sell its new revamped vehicles at a profit in order to sustain itself long enough to get to the cheaper mass market R2 SUV on the road.

Rivian’s path to survival is now remarkably clear

Featured Article

What to expect from WWDC 2024: iOS 18, macOS 15 and so much AI

Apple is hoping to make WWDC 2024 memorable as it finally spells out its generative AI plans.

1 day ago
What to expect from WWDC 2024: iOS 18, macOS 15 and so much AI

As WWDC 2024 nears, all sorts of rumors and leaks have emerged about what iOS 18 and its AI-powered apps and features have in store.

What to expect from Apple’s AI-powered iOS 18 at WWDC 2024

Apple’s annual list of what it considers the best and most innovative software available on its platform is turning its attention to the little guy.

Apple’s Design Awards highlight indies and startups

Meta launched its Meta Verified program today along with other features, such as the ability to call large businesses and custom messages.

Meta rolls out Meta Verified for WhatsApp Business users in Brazil, India, Indonesia and Colombia

Last year, during the Q3 2023 earnings call, Mark Zuckerberg talked about leveraging AI to have business accounts respond to customers for purchase and support queries. Today, Meta announced AI-powered…

Meta adds AI-powered features to WhatsApp Business app

TikTok is testing streaks that are similar to Snapchat’s in order to boost engagement, including how long people stay on the app.

TikTok is testing Snapchat-like streaks

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! Your usual…

Inside Fisker’s collapse and robotaxis come to more US cities

New York-based Revel has made a lot of pivots since initially launching in 2018 as a dockless e-moped sharing service. The BlackRock-backed startup briefly stepped into the e-bike subscription business.…

Revel to lay off 1,000 staff ride-hail drivers, saying they’d rather be contractors anyway

Google says apps offering AI features will have to prevent the generation of restricted content.

Google Play cracks down on AI apps after circulation of apps for making deepfake nudes

The British retailers association also takes aim at Amazon’s “Buy Box,” claiming that Amazon manipulated which retailers were selected for the coveted placement.

Amazon slammed with £1.1B data abuse lawsuit from UK retailers

Featured Article

Rivian overhauled the R1S and R1T to entice new buyers ahead of cheaper R2 launch

Rivian has changed 600 parts on its R1S SUV and R1T pickup truck in a bid to drive down manufacturing costs, while improving performance of its flagship vehicles.  The end goal, which will play out over the coming year, is an existential one. Rivian lost about $38,784 on every vehicle…

1 day ago
Rivian overhauled the R1S and R1T to entice new buyers ahead of cheaper R2 launch

Twitch has come up with a solution for the ongoing copyright issues that DJs encounter on the platform. The company announced Thursday a new program that enables DJs to stream…

Twitch DJs will now have to pay music labels to play songs in livestreams

Google said today it is partnering with RapidSOS, a platform for emergency first responders, to enable users to contact 911 through RCS (Rich Messaging Service).

Google partners with RapidSOS to enable 911 contact through RCS

Long before product-led growth became a buzzword, Atlassian offered free tiers for virtually all of its productivity and developer tools. Today, that mostly means free access for up to 10…

Atlassian now gives startups a year of free access