How hackers could have remotely controlled millions of cars

Sjoerd van der Wal/Getty Photographs

Automotive house owners, are you sitting down? Cybersecurity researchers not too long ago reported a flaw in an internet site — operated by automaker Kia — that enabled them to remotely management key capabilities of tens of millions of automobiles.

The complete report, printed on the personal blog of Sam Curry — one of many researchers — presents a timeline of how the staff found the exploit and the way they managed to put it to use to interrupt into automobiles. 

Additionally: Android Automotive receives new QOL update, including support for Bluetooth headphones

In June, the researchers discovered vulnerabilities affecting “Kia automobiles that allowed distant management over key capabilities utilizing solely a license plate.” Their report reveals they have been in a position to remotely observe a automobile’s location, unlock its doorways, honk the horn, and begin the engine. On sure Kia fashions, they have been even in a position to activate the digital camera from a distance. 

The researchers told Wired this exploit was accessed by means of a “flaw in an internet portal operated” by Kia, which gave the staff entry to the entire internet-based options within the producer’s automobiles.  

Curry posted a YouTube video that confirmed him hacking right into a 2022 Kia EV6 with a customized app known as KIAtool. He first enters the automobile’s license plate quantity and US state to acquire its VIN (automobile identification quantity). As soon as all knowledge is obtained, Curry goes to the Storage tab, hits “Unlock”, and presto — the doorways are open.

Along with offering entry to controlling automobiles, the online portal flaw additionally gave hackers a ton of non-public details about Kia prospects, together with names, telephone numbers, dwelling addresses, and “previous driving routes.”

The researchers knowledgeable Kia in regards to the web site vulnerability, which has since been patched. Kia mentioned the flaw was by no means used maliciously and KIAtool was by no means launched to most people.

So it is a completely happy ending, proper? Probably not. Extra override exploits have been unearthed beforehand on different automobile manufacturers, together with Honda, Nissan, Mercedes, Hyundai, BMW, and Ferrari. 

Additionally: The NSA advises you to turn off your phone once a week – here’s why

kiacargettyimages-1199701120

Sjoerd van der Wal/Getty Photographs

Curry’s staff additionally discovered the same flaw on Toyota’s net portal. Toyota was made conscious of the issue and shortly patched it. It is nice to see such swift motion, however the issue is when there’s one bug, there are all the time much more on the market. 

Sadly, there is not a lot the typical automobile proprietor can do; carmakers have to make safety a prime precedence. I strongly advocate putting in any accessible software program patches to make sure your automobile has one of the best safety attainable. 

Shopping cart