Hacking of Your Car Is Possible on Android Phones

We are now living in an era of being connected to the internet or via wireless technology. From smartphones to cars, manufacturers are rushing to connect mobile phones and vehicles to perform various functions like driverless cars and so on. Meanwhile, some mobile apps are now able to summon vehicles just as we have seen in Knight Rider. With the advancement of technology comes the danger – these phones can be hacked and when hackers can launch terror or hijack vehicles with ease.

A test has been conducted on at least nine vehicles built by seven companies that are connected with Android apps and they are all vulnerable to attacks. Researchers from Kaspersky, a software security firm, confirmed that most mobile apps, which have been downloaded over a million times, do not even have basic software defence system for drivers to protect themselves in case of an attack. Hackers can root a phone or trick users into installing malicious malware code, unlock the vehicle and start the ignition key.

The Ignition Remix

As of today, researchers have refused to name specific mobile apps that they tested over the fear that their publication would help car thieves. However, they argue their studies should make the car industry take to consider car security in a serious manner.  It is time connected car application developers treat their products just like banking apps, according to Kaspersky lead researcher Viktor Chebyshev.

In the worst-case scenario, researchers have found that hacker can access to locked vehicles; vehicle thieves would require other tricks for more serious attacks, like controlling the key or maybe disabling the vehicles’ immobiliser, which is a system that prevents vehicles from being stolen. They found that Tesla’s cars which permit a car to be driven via smartphone app only is an excellent example of how hacking a mobile phone can lead to theft, even though Tesla cars were not a part of their research.

The security experts’ analyses are based on the mobile apps themselves—they only ‘hacked’ into one of the affected vehicle models in question. And, they claim that there was no need for injecting Android malware to pull off the dirty tricks thieves or terrorists can pull to cause damage. They also warned that poorly built apps that lacked proper coding are vulnerable to vehicle thieves and they highlighted a case in which hacker forums are showing interest in hacking of apps-connected vehicles. They clearly display offers to buy & sell connected vehicle app credentials including their usernames and passwords, shockingly even PIN numbers and the unique Vehicle Identification Numbers (VINs) of different vehicles. The usual rate runs into hundreds of dollars per such account. Chebyshev said that cybercriminals are preparing for such attacks and the vehicle industry should take notice of these online activities.

The Kaspersky security researchers have highlighted three techniques for exploiting Android applications they tested. (iOS is much more difficult for hackers to attack). They found that, except one app, stored the apps username, password, or both in unencrypted manner in the mobile device’s storage. And, when rooting the victim’s mobile phone —by exploiting full privileges in the phone’s OS —an expert hacker can get access to those stored account login details and send them off to his command-and-control server. Hackers could also trick vehicle owners into downloading an altered/hacked versions of car apps in order to steal login details. Alternatively, car thieves can infect mobile phones with malwares that can launch an “overlay” attack: When the car-app starts, the malware could immediately detect that it is loading and it can preempt it with some fake user interface and the steals the details and transfer the same to some remote location. A hacker may also infect the app with multiple overlays in order to spoof off any connected car app the innocent victim may load.

Time to Buckle Up

The security experts also said that they have reported their findings to several companies whose cars are highly vulnerable. However, they noted that most problems are not even security bugs, so much as a lack of proper safeguards. Encrypting the login credentials stored on a mobile device, adding two-stage authentication or maybe a fingerprint authentication, or maybe creating integrity checks in the apps could work to prevent malicious code from being injected into the apps.

This is not the first time makers of app connected cars are facing safeguards issues in their products. Toyota, Nissan,and Ford has also been vulnerable to hacking. It is also important to note that the problem is not solely confined to phones using Android system. Security expert Samy Kamkar, back in 2015, explained how he could deploy a tiny piece of hardware hidden on a vehicle to intercept login credentials from apps based on iOS like Onstar (GM), UConnect (Chrysler), mbrace (Mercedes-Benz) and Remote (BMW) — all via wirelessly. Kamkar’s hacking method also allowed him to locate a car from a remote location, unlock it, and in some cases start the ignition. In such attack, he said there won’t be “no warnings” and your car credentials would be easily stolen and reused by the hacker “without phone modifications” while comparing his attack method with the one conducted by Android hackers as suggested by security experts at Kaspersky.

As connected vehicles are gaining huge interest among buyers, researchers at Kaspersky said manufacturers must be able to lock down mobile apps that could control their products even as both ethical malware testers and criminal hackers gear up to find flows in their systems. It may be better if we can open the car door without ever triggering the car alarm, however these functionalities are just being explored, said Kaspersky lead researcher Mikhail Kuzin, adding car makers “will have to add new security features to make users lives more convenient and at the same time prevent attacks”. It’s time app makers and car makers take utmost care in security issues, and do it right.