{"id":4511,"date":"2015-01-27T10:00:56","date_gmt":"2015-01-27T15:00:56","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4511"},"modified":"2020-02-26T18:59:33","modified_gmt":"2020-02-26T14:59:33","slug":"progressive-snapshot-car-hacking","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/progressive-snapshot-car-hacking\/4511\/","title":{"rendered":"Progressive Snapshot Exposes Drivers to Car Hacking"},"content":{"rendered":"<p>A researcher discovered last week that he could <a href=\"https:\/\/threatpost.com\/holes-in-progressive-dongle-could-lead-to-car-hacks\/110511\" target=\"_blank\" rel=\"noopener nofollow\">exploit Progressive\u2019s Snapshot driver tracking tool<\/a> in order to hack into the onboard networks of certain automobiles. Snapshot is a tool manufactured by Progressive auto insurance that plugs into the <a href=\"http:\/\/en.wikipedia.org\/wiki\/On-board_diagnostics#OBD-II\" target=\"_blank\" rel=\"noopener nofollow\">OBD-II port<\/a>. Its purpose is to monitor driving behavior in order to offer cheaper insurance rates to safer drivers.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/05111827\/Progressive-Snapshot-Hack-1-1024x768.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7285\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/05111827\/Progressive-Snapshot-Hack-1-1024x768.png\" alt=\"Progressive-Snapshot-Hack\" width=\"1067\" height=\"800\"><\/a><\/p>\n<p>For the uninitiated, the OBD-II is the input port beneath and, in general, slightly to the left of your steering wheel. It\u2019s the port into which your mechanic plugs his emissions inspection machine to check all the codes in your car\u2019s computer systems to make sure the vehicle isn\u2019t releasing harmful pollutants. It\u2019s also the port into which you can plug a diagnostic scanner to check why your check engine light has turned on.<\/p>\n<p>Simply put: Your car\u2019s computer network consists of sensors, electrical control units, and the <a href=\"http:\/\/en.wikipedia.org\/wiki\/CAN_bus\" target=\"_blank\" rel=\"noopener nofollow\">controller area network<\/a> (CAN) bus. The ECUs, of which there can be very many, serve a variety of purposes, but mainly they process signals from sensors monitoring everything from engine control to airbags, to any number of other components most have never heard of. ECUs are connected and communicate via the CAN bus. For example: If you crash your car, a sensor tells its ECU that it thinks you crashed, and the ECU then passes that message along the CAN bus to another ECU that tells your airbag to deploy.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>@Progressive #Snapshot driver monitoring tool is insecure and exposes drivers to car hacking:<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FxjD5&amp;text=%40Progressive+%23Snapshot+driver+monitoring+tool+is+insecure+and+exposes+drivers+to+car+hacking%3A\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The OBD-II port <em>used<\/em> to be the only way to plug into and communicate with the CAN bus and its ECUs. New research shows that <a href=\"https:\/\/www.kaspersky.com\/blog\/car_hacking_goes_mobile\/\" target=\"_blank\" rel=\"noopener nofollow\">this can be done wirelessly as well<\/a>.<\/p>\n<p>Digital Bond Labs security researcher Cory Thuen got a Snapshot device, which is used in nearly two million cars. He reverse engineered it, figured out how it worked, and plugged it into his Toyota Tundra. Then determined that Snapshot does not authenticate itself nor does it encrypt its traffic data, contain digital validation signatures, or offer a secure boot function.<\/p>\n<p>To be clear, Snapshot devices communicate with Progressive over the cellular network in plain text. This means that an attacker could pretty easily set up a fake cell tower and perform a man-in-the-middle attack.<\/p>\n<div class=\"pullquote\">It\u2019s entirely possible that a remote hacker could inject code through a Snapshot dongle and onto the very network that controls your car\u2019s airbags and emergency brakes.<\/div>\n<p>Despite these serious security lapses, the device has the capacity to communicate with the CAN bus. Therefore, it\u2019s entirely possible that a remote hacker could inject code through a Snapshot dongle and onto the very network that controls your car\u2019s airbags and emergency brakes. Thuen\u2019s work stopped short of injecting code into the car\u2019s network. He claims he was merely interested in figuring out if there was any security in place to stop him from doing it.<\/p>\n<p>Before you panic, <a href=\"https:\/\/www.kaspersky.com\/blog\/podcast-protecting-cars-with-av-style-detection\/\" target=\"_blank\" rel=\"noopener nofollow\">I spoke with IOActive\u2019s director of vehicle security research<\/a> and famed car hacker, Chris Valasek, about pumping malicious code into the CAN bus last year, and he assured me that it\u2019s easier said than done.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Security<\/a> Holes in <a href=\"https:\/\/twitter.com\/progressive?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Progressive<\/a> Dongle Could Lead to Car Hacks \u2013 <a href=\"http:\/\/t.co\/4iWReok2F4\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/4iWReok2F4<\/a><\/p>\n<p>\u2014 Threatpost (@threatpost) <a href=\"https:\/\/twitter.com\/threatpost\/status\/557257225811791872?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 19, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Sure, it\u2019s possible to inject code telling your car to initiate automatic parallel park assist while you are speeding down the highway. However, your car\u2019s ECUs are processing thousands of other signals at any given point while your car is in motion. So, in order to initiate automatic parallel park assist (or any other feature), the attacker would have to flood the CAN bus with enough signals to override all of the legitimate information that the car\u2019s sensors are outputting.<\/p>\n<p>Valasek and fellow researcher Charlie Miller managed to <a href=\"https:\/\/www.kaspersky.com\/blog\/car-hacking\/\" target=\"_blank\" rel=\"noopener nofollow\">manipulate seat-belt locks, brakes and steering<\/a> by flooding onboard networks with spoofed sensor signals a couple years ago. However, this process was labor intensive and Miller and Valasek, two of the brighter minds in the security industry, had a DARPA grant to work on their research.<\/p>\n<p>The good news is that not many people are doing CAN bus research. A lot of people, on the other hand, are working on browser security research. Car hacking is likely to take off as manufacturers begin integrating browsers and other Internet connected features into the cars they build and sell.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.<\/p>\n","protected":false},"author":42,"featured_media":4512,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[904,749,78,700],"class_list":{"0":"post-4511","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-car","9":"tag-car-hacking","10":"tag-hackers","11":"tag-research"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/progressive-snapshot-car-hacking\/4511\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/progressive-snapshot-car-hacking\/4566\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/progressive-snapshot-car-hacking\/5067\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/progressive-snapshot-car-hacking\/5362\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/progressive-snapshot-car-hacking\/6761\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/progressive-snapshot-car-hacking\/7284\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/progressive-snapshot-car-hacking\/6694\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/progressive-snapshot-car-hacking\/6761\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/progressive-snapshot-car-hacking\/7284\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/progressive-snapshot-car-hacking\/7284\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/car\/","name":"car"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4511"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4511\/revisions"}],"predecessor-version":[{"id":15975,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4511\/revisions\/15975"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4512"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}