Chrysler is recalling about 1, 4 million. Car



Chrysler has released a software update for the emergency number of their cars (brands Dodge, Jeep, Ram and Chrysler), learning that two hackers were able to take control of the Jeep "Cherokee" from a distance of several kilometers and crash it into a ditch.

Experts fear that these cyber attacks have the potential risk of death or injury to the driver and passengers, and will cause chaos on the roads.

Chrysler calls the owners of the recalled vehicles to contact the company to update the software.

The owners will not have to visit the dealer as it is the usual procedure for revocation. Instead, they will receive USB-stick with which, when you connect it to the car will be downloaded patch to fix security errors.

About breaking learned from the article в magazine Wired . Two professional hacker, one of whom had previously worked for the National Security Agency have demonstrated the ability to intercept driving. The next month they plan to reveal some of his tricks during a security conference Black Hat in Las Vegas.



Cybersecurity Experts have previously warned that the automotive industry may inadvertently create opportunities for hackers to interfere with the operation of vehicles. These are entry points as a diagnostic OBD port, as well as a growing list of wireless entry points from the compulsory tire pressure monitoring to infotainment technology using 4G LTE.

The latter path has been used by hackers Charlie Miller and Chris Valasek to apply vulnerability Jeep Cherokee in 2014, equipped with a FCA Uconnect system which refers to the network of Sprint. Hackers are a few kilometers away from the car, which they were able to provide access to critical control systems. Hackers use cheap Kyocera Android phone is connected to the MacBook to find targets in 3G. They received GPS coordinates, identification number, model, date of manufacture and the IP address of the cars in the nearest neighborhood.

When they first found a bug in the UConnect, it is assumed that this will only work within 100 meters - within the work direct-WiFi. When they found out earlier this summer a bug in the implementation of cellular UConnect, it is assumed that it will provide an opportunity to attack the cars within the same mobile station. But they soon discovered that the distance for the attack has no chapel - to break the car can be anywhere where there is internet access, at any distance.

They seized control of wiper and washer pump, switch off the engine while driving on the highway, took control of the steering wheel, turned off the brake, and the car was sent to a volunteer in the highway in a ditch.

Hackers and contacted the automaker reported the vulnerability.

The automaker said it is concerned that hackers plan to disclose part of the code used in the hacker conference. Chrysler insists that it is dangerous even after software updates cars. Also, according to statistics in the recall of vehicles, even potentially deadly safety defects, only from 70 percent to 8 percent of owners bother to review the procedure and make it possible to repair their cars.

Source: geektimes.ru/post/259290/

Tags

See also

New and interesting