Remotely Hacking a car through an OBD-II Bluetooth Dongle

Ғылым және технология

If you like to know more about ASRG, look at our quick introduction at • Intro to ASRG , visit our webpage at www.asrg.io or contact us directly.
PRESENTATION:
In this presentation, we will first discuss the potential attack vectors that could be used to remotely attack a car. Next, we will give a brief introduction to the OBD-II Bluetooth dongle that we have tried to hack. We will discuss the various vulnerabilities that we have discovered on this dongle, including mobile apps, Bluetooth pairing, firmware, and hardware. We will explain how we leveraged a development backdoor to bypass the hardware protection and dump the firmware, tampered with the mobile apps, exploited Bluetooth communication, abused the over-the-air update mechanisms, and sent forged CAN bus messages to achieve remote car controlling.
PRESENTERS:
Aaron Luo Aaron Luo is a security researcher at VicOne's Automotive Cyberthreat Research Lab. He joined VicOne's parent company, Trend Micro, in 2015. He is actively involved in the information security communities in Taiwan and frequently shares his experiences with academia, industry, government agencies, and international conferences.
Spencer Hsieh is a security researcher at VicOne’s Automotive Cyberthreat Research Lab. He joined VicOne’s parent company, Trend Micro, in 2009.
He has presented research at several security conferences. His areas of expertise include automotive cybersecurity, advanced persistent threat, malware analysis, and exploitation techniques. His current research focuses on areas of automotive cybersecurity and emerging threat.
PRESENTATION SLIDES:
garage.asrg.io/webinars/remot...

Пікірлер: 7

  • @johnboscovijayanand
    @johnboscovijayanand11 ай бұрын

    Good one and an eye opener!

  • @newtimeageful9969
    @newtimeageful996911 ай бұрын

    want to see more in the future

  • @iam1smiley1
    @iam1smiley13 ай бұрын

    These dongles are also marketed for rust prevention and insurance companies are also encouraging there use to monitor drivers for "discounts" (which should be stopped). I did quality control for a large bodyshop and was really surprised how many vehicles came through the shop with something plugged into the DLC when I needed to hook up a scan tool. Also, with the proliferation of cheap Chinese scan tools on the market...I really wonder when someone will hack the scan tools themselves (CCP even), every mechanic around has a cheap Chinese scan tool in their arsenal and could easily be vectors used to spread custom malware for each model of vehicle to later be triggered if chosen.

  • @mohammedshine2372
    @mohammedshine237211 ай бұрын

    Good video

  • @user-om7zn6wv4t
    @user-om7zn6wv4t11 ай бұрын

    I can't understand how to bypass the firewire integrity check😅

  • @renakunisaki
    @renakunisaki11 ай бұрын

    I can barely understand what's being said. Especially one speaker has a lot of background noise.

  • @automotivesecurityresearch1613

    @automotivesecurityresearch1613

    11 ай бұрын

    Thanks for the feedback @renakunisaki, we will work on making sure the audio on future videos is better. Apologies.

Келесі