Vulnerability Research

Car Hacking Project Volkswagen & Audi

1 April 2018 2 min read
Daan

by Daan Keuper

Head of Security Research

Control over the navigation system

Research goal: “Can we influence the driving behavior or critical security systems of a car via an internet attack vector?”

We succeeded in gaining access to the system at a distance. This means that in certain situations attackers could listen in to conversations the driver conducted via a car kit, switch the microphone on and off and also access the complete address book and conversation history. In addition, due to the vulnerability, it was possible via the navigation system to find out exactly where the driver had been, as well as following live where the car was at any given moment. These are all factors through which the privacy of the driver could be seriously damaged.

The systems to which we were able to gain access are connected indirectly to the systems responsible for braking and accelerating. Since hacking of such systems is illegal and the intellectual property of the manufacturer is thereby infringed, it was decided at that point to stop the investigation.

Daan 1

Modernisation of update policy

Immediately after the discovery we reported the leak to the Volkswagen Group. They have now been able to inform us that the vulnerabilities have been solved. However, this does not mean that the danger has passed. It is, in fact, impossible to update this type of infotainment system at a distance, which means that cars already in use with this system are still vulnerable. And if you may rightly assume that a car is on average 18 years old when it is scrapped, then there are still many years in which attackers could abuse that system.

This is why we advocate modernisation of the update policy by the automotive industry, in order to make it easier for consumers to update the software systems in their cars to the most recent version. This would mean that they can always be protected against the latest threats.

Turn 24/7 security monitoring into real response capability.

Speak with our experts and learn how rapid, expert-led response transforms your security posture.

Contact us