sábado, 24 de janeiro de 2015

VIDEO: "Tesla Model S" Hacked to Start Without Key

A Vulnerability in the "Tesla Model S" Fully Electric Luxury Car, Allows an Attacker to Unlock the Vehicle, Start the Engine and Drive Away with it. The Report is the 2nd One from Chinese Security Company, Qihoo 360, regarding the Security of this Particular Tesla Model. In a Different Demonstration, Researchers Managed to Bypass the Car’s Protection Systems and Change the Lock State, Turn on the Headlights, Honk the Horn, as well as, Open and Close the Sunroof. Both Vulnerabilities Have been Shown during the SyScan Security Conference that Took Place in Beijing back in July 2014. One Challenge from the Organizers was to Break the Security System of a "Tesla Model S" and Control it from Afar. The Prize for Whoever Achieved this, was $10,000 / €8,600.


The Keyless Drive Away Flaw Presented by Qihoo 360, Can be Exploited through a Man-in-the-Middle (MitM) Attack, Followed by a Replay Attack. According to Details from the Company, an Attacker Can Learn the Authentication Secret for Starting the Vehicle by Intercepting the Communication between the Key Fob and the Car. Since the Information is Exchanged via a Radio Frequency Signal, the Attacker Can then Create a Device that Acts as the Original Key Fob and Delivers the Stolen Authentication to the Car System. Liujian Hao of Qihoo 360 Says (Chinese) that, the Signal from the Key Fob Can be Recorded Even if No Command is Sent to the Car, which Would Make a Target Out of the Spare Keys, too. He Recommends Tesla Owners to Pay Attention to their Surroundings When Using the Keys.


Qihoo 360 Provided the Results of its Findings to Tesla in July 2014 but, Made the Risk Known Publicly only this Wednesday, as per their 180-Day Vulnerability Disclosure Policy. The Company is Not Aware if Tesla Addressed this Issue. However, after Receiving the Report, Tesla Said, they Confirmed the Flaw and Would Release a Fix as Soon as Possible. According to the Firmware Changelog, there Have been Multiple Updates Each Month since the SyScan Conference in Beijing. One Entry for Version 5.12 of the Firmware, Released after the Security Conference, Reads: “Replacement key fobs can be paired to the car without replacing the BCM [body control module]”. Tesla is the 1st Car Maker Showing Explicit Interest in the Security of its Products by Starting a Bug Hunting Program.




A Video Proving the Hack has been Created but, Not Much Information Can be Extracted from it, Except for Chinese Speakers:

http://v.youku.com/v_show/id_XODc1MzcyNTQw.html


Info Source:

http://bobao.360.cn/news/detail/1149.html



0 comentários:

Enviar um comentário