Vulnerability in tachograph could be infected by worm

B2B Cyber ​​Security ShortNews

Share post

Vulnerabilities in common electronic tachographs (ELDs) could be present in more than 14 million U.S. trucks, according to researchers at Colorado State University. The experts demonstrated how the attacks could take place.

U.S. regulations require modern trucks to be equipped with electronic logging devices (ELDs), but these have become potential cybersecurity threat vectors. Research from three Colorado State University experts uncovers three critical vulnerabilities in commonly used ELDs.

Three weak points in the tachographs

First, they demonstrated that the ELDs could be controlled wirelessly to send arbitrary Controller Area Network (CAN) messages, allowing unauthorized control of vehicle systems.

The second vulnerability shows that malicious firmware can be uploaded to these ELDs, allowing attackers to manipulate data and vehicle operations at will. The final and perhaps most concerning vulnerability is the possibility of a self-propagating truck-to-truck worm that exploits the inherent networking capability of these devices. Such an attack could cause widespread disruption to commercial fleets, with serious implications for safety and operations.

Hack demonstration on a test system

Using test systems on a test bench, the experts demonstrated that they not only have theoretical concerns, but also showed how the attacks work in practice. These results show that there is an urgent need to improve the security posture of ELD systems.
Following some best practices and adhering to known requirements can significantly improve the security of these systems. The researchers explain the process of discovering the vulnerabilities and their exploitation in a detailed report.

Editor/sel

 

Matching articles on the topic

Vulnerability in tachograph could be infected by worm

According to researchers at Colorado State University, over 14 million US trucks could have vulnerabilities in standard electronic tachographs ➡ Read more

Dinner with APT29

In late February 2024, Mandiant identified APT29 - a Russian Federation-backed threat group linked to the ➡ Read more

New variant of SAML attack technique

Security researchers have discovered a new variant of the infamous Golden SAML attack technique, which the team has named “Silver SAML.” With ➡ Read more

EU diplomats: invitation to wine tasting with malware in their luggage 

A recently identified cyber espionage campaign shows how highly specialized attackers are targeting government institutions and diplomats. These threat actors used fake invitations ➡ Read more

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more