Page 101 - Cyber Warnings August 2017
P. 101

Tesla Compromise #2


               Here we go again
               by Charles Parker, II



               Technology advances have improved the devices and user experience (UX) in many of the
               vehicle models being manufactured. These advances have been manifested with the vast
               improvements with mechanical, electrical, and the infotainment system.

               One aspect of this that has garnered attention in the public eye has been the infotainment
               system within the vehicles. These allow the person to change the temperature, monitor the tire
               air pressure, call others, received directions, and receive alerts as to the vehicle status. A
               functionality that has been embraced by vehicle owners continues to be the connectivity. This
               allows the owner to start the vehicle from their office or living room, check on the car’s status
               from across the country, or lock/unlock the car’s doors. This newer technology has allowed the
               consumer to be in more control with their vehicle.

               Connectivity Vulnerability
               Although this is a clear benefit, there have been risks with this. The recent vehicle attacks have
               focused on this portion of the attack surface. As a further testament of this, Tesla has had its
               issues.

               Keen Security Lab, a division of Tencent, researched the Tesla vehicle for months. This
               extended period allowed for the extended testing for the Model S, P85, and 75D. This slow and
               systemic testing provided time to fully test these models and systems. This testing allowed for
               the vulnerability and exploit to be elaborated, elucidated, and expounded upon.

               This is differentiated from the first attack, which was essentially a physical attack and attempt to
               breach the vehicle’s system. With the first attack, the third party was required to pull a section of
               the dash back and connect the laptop to the vehicle with a patch cord, which was plugged into
               the car. This attack was far from simple or short in duration. The second attack focused more on
               a common vulnerable point. With many other attacks, the connectivity and WiFi for the vehicle
               was proven to be vulnerable.


               Attack
               Specifically the Tesla Model S was analyzed at lengths by the Keen Security Lab. This model
               had a vulnerability that could be exploited remotely. This was tested at 12 miles from the
               vehicle. This attack focused on the CANbus of the vehicle. Once compromised, the attackers
               could control many functions of the vehicle. For this to function, the vehicle must be connected
               to the malicious WiFi hotspot. This is the key and the method of attack. Once the vehicle
               connects to the hotspot, the attacker enters through this connection with the browser in the
               infotainment system.



                  101    Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   96   97   98   99   100   101   102   103   104   105   106