cyber security in transportation

58
Lecturer: Oren Elimelech Ministry of Transport & Road Safety Cyber Security Adviser / SecuRegion CISO CISO, CISM, CISA, CISSP, VCP, MCSE, MCT, A+, CCIE, CCSA Cyber Security in Transportation 19 th August 2015

Upload: oren-elimelech

Post on 16-Apr-2017

1.025 views

Category:

Automotive


0 download

TRANSCRIPT

Page 1: Cyber Security in Transportation

Lecturer:

Oren Elimelech

Ministry of Transport & Road Safety Cyber Security Adviser / SecuRegion CISO

CISO, CISM, CISA, CISSP, VCP, MCSE, MCT, A+, CCIE, CCSA

Cyber Security in Transportation

19th August 2015

Page 2: Cyber Security in Transportation

Oren Elimelech Cyber Security, GRC, ITC, Forensics & Cloud Consultant

• ISC2 • ISSA • ISACA

• IARM • CSA • OWASP 2

Who are you?... About Myself

Page 3: Cyber Security in Transportation

• Transportation Cyber Security

• Aviation Attacks

• Public Transport Attack

• Remote Exploitation of a Vehicle and other vegetables

• Q & A

Todays Agenda:

4

Page 4: Cyber Security in Transportation

• The transportations segment includes many area: • Mass land transportation – Trains, Busses, Trucks etc.

• Aviation transport – Planes, Airports among others.

• Naval transport – Ships, harbors, nav. system etc.

• Traffic & Transit control – signal control, warning lights, road crossing illumination, tunnels and many more

• Vehicle – CAN bus, ECM, ECU, connected vehicles

• Most of the systems used are SCADA systems

• They are used for: power control, emergency ventilation control, alarms, indicators, sensors, fire/intrusion detection, control/signaling, AVL, access control etc.

Transportation Cyber Security

5

Page 5: Cyber Security in Transportation

• Most of the those system are vulnerable to cyber attacks since most are not totally disconnected

• Some are prone to physical access or even Radio data link or Cellular (Watch Tower, Black Box etc)

• Maintenance, firmware and software upgrades

• And the list gets even longer

• Manifestation Impact – a vulnerability cascading effect reaching other systems & services

• One must ensure the Confidentiality (not necessarily security classified information), the Availability and the Integrity of information in ICT systems

Areas of Compromise

6

Page 6: Cyber Security in Transportation

• Expanding the scope from focusing only on external hostile threats to miscellaneous general external and internal threats – caused deliberately and accidently, technical failures and natural disasters • For instance: Avionics control system failure in UK

following a software upgrade

• Strong emphasis on supposedly peripheral systems that are not defined as critical national infrastructures • For instance: LOT airline company cyber attack

My Work Objectives & Tasks

7

Page 7: Cyber Security in Transportation

Aviation Attacks

8

Page 8: Cyber Security in Transportation

• On June 21st operations were disrupted at Warsaw Chopin Airport by what LOT Polish Airlines said was a cyberattack on flight-planning computers. 10 LOT flights were canceled and some 15 others were grounded for several hours, affecting roughly 1,400 passengers

LOT Airline Cyber Attack

9

Page 9: Cyber Security in Transportation

• U.S. aviation regulators and industry officials have begun developing comprehensive cybersecurity protections for aircraft, seeking to cover everything from the largest commercial jetliners to small private planes

LOT Airline Cyber Attack

10

Page 10: Cyber Security in Transportation

• On July 8th 2015 – United Airlines issued a statement saying it suffered from “a network connectivity issue” – effecting 4,900 flights were impacted by the problem worldwide

United Airline vulnerabilities

11

Page 11: Cyber Security in Transportation

• On July 15th 2015 – United Airlines gave 1 million miles bug bounty to a security researcher after finding Remote-execute, XSS and CSRF bug in the Airline mobile-app & website enabling private information disclosure and exploits

United Airline vulnerabilities

12

Page 12: Cyber Security in Transportation

• On August 17th 2015 – United Airlines frequent Flyer App was hacked revealing passengers private information – Yosi Dahan (whitehat hacker)

United Airline vulnerabilities

13

Page 13: Cyber Security in Transportation

Public Transport Attack

14

Page 14: Cyber Security in Transportation

Once in the

system, they

disconnected

signal control

boxes at four

intersections and

locked out

anyone else from

being able to fix

the problem

"So for four days

in this major city,

the traffic lights

would just blink

and go from color

to color"

A large US city

locked in labor

negotiations with

union employees was

hit by two employees

who helped build the

traffic control system

for the organization

in protest of the

proceedings. Even

though the city had

pre-emptively

disabled union

employee access to

systems due to

concerns of potential

sabotage, these two

insiders managed to

gain control of the

system due to a

supervisor previously

sharing his credentials.

Dawn Cappelli,

principal engineer

at CERT

Insiders using authorized access

18

Page 15: Cyber Security in Transportation

Vehicle Attack

16

Page 16: Cyber Security in Transportation

• Two researchers from US: • Charlie Miller

• Chris Valasek

• Work diligently since 2010 on DARPA funding

• VIDEO DEMO

Hacking Chrysler Jeep Remotely

17

Page 17: Cyber Security in Transportation

• Controller Area Network (CAN)

• Developed by Bosch 1983-86 for automobile in-vehicle network

• Multi-drop, Multi-master serial bus providing communication between controllers, sensor and actuators

• Highly reliable and robust, well proven technology

• Inexpensive

• First car BMW series 8 - 1988

• 100% car since 2008 user CAN bus

CAN Bus Quick Intro

18

Page 18: Cyber Security in Transportation

• Until CAN Bus – vehicles contained enormous amounts of wiring that was necessary to interconnect all the various electronic components

CAN Bus Quick Intro

19

Page 19: Cyber Security in Transportation

• CAN Bus reduced wiring in over 2km and weight of over 50kg

CAN Bus Quick Intro

20

Page 20: Cyber Security in Transportation

• International Standard ISO 11898 • ISO 11898-2 High speed application –1 Mbps

• ISO 11898-3 Low speed application –125 Kbps

• CAN id being used widely in other applications: • Automotive

• Military vehicles

• Industrial machinery

• Medical systems

• Agricultural machinery

• Marine control and navigation

• Elevator control systems

CAN Bus Quick Intro

21

Page 21: Cyber Security in Transportation

• Network Layered Model

CAN Bus – based on OSI model

22

Partially implemented by higher-

level CAN protocols like

CANopen, CANaerospace,

MilCAN, SAE J1939, ISO 1132

and others

Standard CAN implementation

defines most of the lowest two

layers (physical details often

specified by higher-layer

protocol)

Bypass used without

higher-layer protocols

User Interface

Page 22: Cyber Security in Transportation

• All messages are broadcast

• Any node is allowed to broadcast a message

• Each message contains an ID that identifies the source or content of a message

• Each receiver decides to process or ignore each message

• Single twisted pair wire terminated on each end

CAN Bus Characteristics

23

Page 23: Cyber Security in Transportation

• Physical medium

CAN Bus Characteristics

24

Page 24: Cyber Security in Transportation

• Oscilloscope – Signal levels (Differential signaling)

CAN Bus Characteristics

25

CAN H

CAN L

Page 25: Cyber Security in Transportation

• Oscilloscope – Signal levels (Differential signaling)

CAN Bus Characteristics

26

Recessive 0 Dominant 0 Recessive 1

Page 26: Cyber Security in Transportation

• Data Frame • Used to transmit data

• Remote Frame • Used to request data transmission

• Error Frame • Sent by a node that detects an error

• Overload Frame • Sent by a node to request a delay in transmission

CAN Bus Network Frames

27

Page 27: Cyber Security in Transportation

• Multiple operation sensors

• Alarms & Alerts can be disabled and even used…

CAN Bus Vehicle Platform

28

Page 28: Cyber Security in Transportation

• CAN Bus can be used to access other vehicle systems

CAN Bus & Other Vehicle Platforms

29

Page 29: Cyber Security in Transportation

Chrysler Jeep 2014 Remote Hacking

30

Page 30: Cyber Security in Transportation

• The Jeep Cherokee was chosen due to the fact that the head unit (Radio) is connected to both CAN buses

Chrysler Jeep 2014

31

Page 31: Cyber Security in Transportation

• Adaptive Cruise Control (ACC) • assists the driver in keeping the proper distance between

themselves and cars ahead of them

• Forward Collision Warning Plus (FCW+) • prevents the Jeep from colliding with objects in front of it

Cyber Physical Features

32

Page 32: Cyber Security in Transportation

• Lane Departure Warning (LDW+) • examines the lines on the road (i.e. paint) to detects the Jeep is

leaving the current lane, it will adjust the steering wheel to keep the vehicle in the current lane

Cyber Physical Features

33

Page 33: Cyber Security in Transportation

• Park Assist System (PAM) • Permits the driver to effortlessly park the car without much driver

interaction in various scenarios, such as parallel parking, backing into a space, etc.

• The PAM technology played a key role in the hack • Enabling to use this PAM to steer an automobile at high speed

with CAN messages alone

Cyber Physical Features

34

Page 34: Cyber Security in Transportation

• Other vulnerable systems • Tire Pressure Monitoring System (TPMS)

• Passive Anti-Theft System (PATS)

• Bluetooth

• Radio Data System

• WiFi

• GPS

• HVAC (Heating and Air Conditioning)

• Display

• Knobs

Cyber Physical Features

35

Page 35: Cyber Security in Transportation

• Every piece of technology that interacts with the outside world is a potential entry point

Remote Attack Surface

36

Page 36: Cyber Security in Transportation

• Many modern automobiles contain a cellular radio, generically referred to as a telematics system, used to connect the vehicle to a cellular network, for example GM’s OnStar. The cellular technology can also be used to retrieve data, such as traffic or weather information

• This is the holy grail of automotive attacks (Long Cellular cover)

• On the Jeep, all of these features are controlled by the Radio, which resides on both the CAN-IHS bus and the CAN-C bus

Telematics / Internet / Apps

37

Page 37: Cyber Security in Transportation

• The Uconnect system in the Jeep contains the ability to communicate over cellular network using a sierra wireless card for remote connectivity

Telematics / Internet / Apps

38

Page 38: Cyber Security in Transportation

• The telematics, Internet, radio, and Apps are all bundled into the Harman Uconnect system that comes with the 2014 Jeep Cherokee

Infotainment

39

Page 39: Cyber Security in Transportation

• The 2014 Jeep Cherokee uses the Uconnect 8.4AN/RA4 radio manufactured by Harman Kardon with the majority of functionality is physically located on a Texas Instruments OMAP-DM3730 system on a chip which is common within automotive systems

• The system uses LUA language: a common powerful, fast, lightweight, embeddable scripting language used in many systems worldwide

Uconnect System

40

Page 40: Cyber Security in Transportation

• As mentioned earlier, the Uconnect system has the ability to interact with both the outside world, via Wi-Fi, Cellular, and BT and with the CAN bus

• The processor responsible for interacting with the Interior High Speed CAN (CAN-IHS) and the primary CAN-C bus is a Renesas V850

CAN Connectivity

41

Page 41: Cyber Security in Transportation

• To hack the V850 chip you need the right tools for the job… Which cost the researchers over $6,700 plus having a $1800 per year Tech Authority subscription for being able to buy and updates…

CAN Hacking & Connectivity

42

Page 42: Cyber Security in Transportation

• Using the wiTECH tools you are able to see the entire network of the vehicle

Chrysler Jeep

43

Page 43: Cyber Security in Transportation

WiFi Open Ports

44

• Scanning the vehicle exposed WiFi ports reveals many open ports

Page 44: Cyber Security in Transportation

WiFi Open Ports

45

Page 45: Cyber Security in Transportation

• With all of these services, there is a good chance a vulnerability would be present that could allow remote exploitation, port 6667 seems interesting

• This port is D-Bus over IP, which is essentially an inter-process communication (IPC) and remote procedure call (RPC) mechanism used for communication between processes

WiFi Open Ports

46

No Password Needed!!!

Page 46: Cyber Security in Transportation

• Using DFeet (wiTECH tool) to interact with the D-Bus service on the Jeep for methods to start ‘com.harman.service.SoftwareUpdate’ service

D-Bus Software Update

47

Page 47: Cyber Security in Transportation

• Inserting a USB with a valid ISO to the Uconnect begins the updating process

Jailbreak Uconnect

48

Page 48: Cyber Security in Transportation

• So a new compromised Firmware enables to remotely control the vehicle.

• Even an unsigned firmware can be used to update the system from the head unit

• The problem is that the system is only designed to perform the upgrade from a USB

• This is a big complication for an attacker, since we want to flash the V850 (OMAP chip) without a USB stick…

Software Firmware Upgrade

49

Page 49: Cyber Security in Transportation

• Port 6667 IRC, is bound to all interfaces, therefore D-Bus communications can be performed against the Jeep over the cellular network!

Cellular Exploitation – Remote Update

50

Page 50: Cyber Security in Transportation

• Was used to enable the vehicle to connect to the hacker – using a miniature cell tower (provided to customers with bad reception in their residence). The device can also be used to intercept cellular traffic and modified to an attacker’s specifications

Femtocell

51

Page 51: Cyber Security in Transportation

• Scanning port 6667 from a Sprint device on the IP addresses 21.0.0.0/8 and 25.0.0.0/8. Anything that responds is a vulnerable Uconnect system

Scanning for vulnerable vehicles

52

Page 52: Cyber Security in Transportation

• The D-Bus service on port 6667 running on the Uconnect system in susceptible to command injection vulnerabilities

• Utilizing the ‘NavTrailService’ where code is implemented in ‘/service/platform/nav/navTrailService.lua’

• Unbelievable the service includes ‘execute’ method which is designed to execute arbitrary shell commands!!!

Gaining Code Execution

53

Page 53: Cyber Security in Transportation

• Running arbitrary code on the head unit (OMAP chip) within the Uconnect system enables running various LUA scripts that can be used to affect the vehicle

• This gives the hackers the possibility to remotely control the 2014 Jeep Cherokee – even when a person is inside the vehicle

Uconnect Attack Payloads

54

Page 54: Cyber Security in Transportation

• Identify target

• Exploit the OMAP chip of the head unit

• Control the Uconnect System

• Flash the v850 with modified firmware remotely

• Perform cyber physical actions

Summary - The entire exploit chain

55

Page 55: Cyber Security in Transportation

19: לדוגמא -תוצר סמל •

האודי: לדוגמא -שם תוצר •

10 -קוד דגם •

4LB0EL -דגם תאור•

שטח-פנאי -המרכב •

Q7 -כינוי •

4163 -נפח מנוע •

3065 -משקל כולל •

173 -גובה •

-רמת גימור •

350 -כוחות סוס •

5 -מספר דלתות •

יש -מזגן •

6 -מספר כריות אוויר •

יש - ABSמערכת •

יש -הילוכים אוטומטיים •

- בגאזחלון •

2007 -שנה •

Free Data available in Israel from 2008

56

7 -אגרה קבוצת •

06-0526 -הוראות רישום •

3 -כ רשומים "סה•

3 -רשומים פעילים •

4X4 -הנעה •

יש -הגה כוח •

4 -חלונות חשמל •

יש -גלגלי מגנזיום •

בנזין -סוג דלק •

-ארגז •

יש -בקרת יציבות •

-היברידי •

7 -מספר מושבים •

-כושר גרירה •

-קבוצת זיהום •

-תקינה •

-סטיה מנתיב בקרת •

-ניטור מרחק מלפנים •

-זיהוי בשטח מת •

-בקרת שיוט אדפטיבית •

-רגל הולגיזיהוי •

-מערכת עזר לבלימה •

- רוורסמצלמת •

-חיישני לחץ אוויר בצמיגים •

-חיישני חגורות •

-ניקוד בטיחות •

-בטיחותי איבזוררמת •

-תאורה אוטומטית •

שליטה אוטומטית באורות • -הגבוהים

-זיהוי מצב התקרבות מסוכנת •

-זיהוי תמרורי תנועה •

Page 56: Cyber Security in Transportation

-/briefings.html#remote15-www.blackhat.com/ushttps://

vehicle-passenger-unaltered-an-of-exploitation

http://illmatics.com/Remote%20Car%20Hacking.pdf

57

Further Reading

Page 57: Cyber Security in Transportation

Questions ?

58