{"id":5942,"date":"2017-02-16T08:45:51","date_gmt":"2017-02-16T13:45:51","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=5942"},"modified":"2017-09-24T18:21:40","modified_gmt":"2017-09-24T14:21:40","slug":"rsa-connected-cars","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/rsa-connected-cars\/5942\/","title":{"rendered":"Android for cars: Secure connection?"},"content":{"rendered":"<p>In the movie\u00a0<em>Dude, Where\u2019s My Car?<\/em>\u00a0(2000), viewers follow the humorous tale of two guys who partied a bit too hard trying to remember where they parked their car. We\u2019ve all been there \u2014 well, not to the extent of the movie characters, but raise your hand if you have ever forgotten where you parked at a concert, shopping center, or grocery store.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5943\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2017\/02\/05112228\/android-wheres-my-car-featured-2-1-1.jpg\" alt=\"\" width=\"1280\" height=\"840\"><\/p>\n<p>Fast-forward 17 years and there are apps for everything \u2014 even your car. Chances are, if an app might make part of your life easier, someone will develop it and plenty of people will use it.<\/p>\n<p>Over the past few years, the concept of the connected car has continued to evolve \u2014 and become reality. At this year\u2019s RSA Conference in San Francisco, our anti-malware researchers Victor Chebyshev and Mikhail Kuzin presented research that they conducted on seven popular apps for vehicles.<\/p>\n<p>The apps seem to make users\u2019 lives easier by linking their Android devices to their automobiles, but we have ask: Are we trading security for convenience? And as with many\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/internet-of-crappy-things\/7667\/\" target=\"_blank\" rel=\"noopener nofollow\">IoT connected devices<\/a>, the answer is, security needs to become more of a priority for developers and manufacturers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5944\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2017\/02\/05112227\/connected-cars-apps-1-1.png\" alt=\"\" width=\"800\" height=\"480\"><\/p>\n<p>The primary functions of these apps are to open doors and in many instances start the car. Unfortunately, flaws in the apps could be exploited by attackers:<\/p>\n<p><b>No protection against application reverse engineering.<\/b>\u00a0As a result, malefactors can dig in and find vulnerabilities that give them access to server-side infrastructure or to the car\u2019s multimedia system.<br>\n<b>No code integrity check.<\/b>\u00a0This allows criminals to incorporate their own code in the app, adding malicious capabilities and replacing the original program with a fake one on user\u2019s device.<br>\n<b>No rooting detection techniques.<\/b>\u00a0Root rights provide Trojans with almost endless capabilities and leave the app defenseless.<br>\n<b>Lack of protection against overlaying techniques.<\/b>\u00a0This allows malicious apps to show phishing windows on top of original apps\u2019 windows, tricking users into entering login credentials in windows that send the info to criminals.<br>\n<b>Storage of logins and passwords in plain text.<\/b>\u00a0Using this weakness, a criminal can steal users\u2019 data relatively easily.<\/p>\n<p>Upon successful exploitation, an attacker can gain control over the car, unlock the doors, turn off the security alarm and, theoretically, even steal the vehicle.<\/p>\n<p>The researchers disclosed their findings to the developers (they did not disclose names of the apps publicly) and also told them that no exploitations had been seen in the wild. A full, detailed report on this can be\u00a0<a href=\"https:\/\/securelist.com\/analysis\/publications\/77576\/mobile-apps-and-stealing-a-connected-car\" target=\"_blank\" rel=\"noopener\">found over on Securelist<\/a>, where each of the apps is evaluated.<\/p>\n<p>It\u2019s easy to bury your head in the sand, thinking you won\u2019t be hacked or that this is the stuff of science fiction, but the truth is, ever since its invention, the automobile has been a target for criminals. And if there is a hack to make things easier, just imagine the possibilities.<\/p>\n<p>Another thing to keep in mind is that we\u2019ve already seen vulnerabilities allow smart white-hat hackers to make the jump from \u201cbenign vulnerability\u201d to controlling a car. Two of the bigger automotive stories of the past\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/blackhat-jeep-cherokee-hack-explained\/9493\/\" target=\"_blank\" rel=\"noopener nofollow\">two<\/a>\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/jeep-hacked-again\/12752\/\" target=\"_blank\" rel=\"noopener nofollow\">years<\/a>\u00a0were about how\u00a0<a href=\"https:\/\/twitter.com\/0xcharlie\" target=\"_blank\" rel=\"noopener nofollow\">Charlie Miller<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/nudehaberdasher\" target=\"_blank\" rel=\"noopener nofollow\">Chris Valasek<\/a>\u00a0took control of a Jeep via vulnerabilities.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BlackHat?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#BlackHat<\/a> 2015: The full story of how that Jeep was hacked <a href=\"https:\/\/t.co\/y0d6k8UE4n\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/y0d6k8UE4n<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/bhUSA?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#bhUSA<\/a> <a href=\"http:\/\/t.co\/SWulPz4Et7\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/SWulPz4Et7<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/629651596876644352?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 7, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Ultimately, personal security and app usage comes down to personal preference. Who we share our data with or entrust our convenience to is really up to us. With IoT devices and apps, convenience is too often considered before security.<\/p>\n<p>In closing, Chebyshev notes:<\/p>\n<p>\u201cApplications for connected cars are not ready to withstand malware attacks. We expect that car manufacturers will have to go down the same road that banks have already taken with their applications\u2026 After multiple cases of attacks against banking apps, many banks have improved the security of their products.<\/p>\n<p>\u201cLuckily, we have not yet detected any cases of attacks against car applications, which means that car vendors still have time to do things right. How much time they have exactly is unknown. Modern Trojans are very flexible \u2014 one day they can act like normal adware, and the next day they can easily download a new configuration, making it possible to target new apps. The attack surface is really vast here.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the movie\u00a0Dude, Where\u2019s My Car?\u00a0(2000), viewers follow the humorous tale of two guys who partied a bit too hard trying to remember where they parked their car. We\u2019ve all<\/p>\n","protected":false},"author":636,"featured_media":5943,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[1287,109,698,522,1288,977,1289,521],"class_list":{"0":"post-5942","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-amr","10":"tag-apps","11":"tag-connected-cars","12":"tag-rsa","13":"tag-rsa-2017","14":"tag-rsa-conference","15":"tag-rsac","16":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rsa-connected-cars\/5942\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/rsa-connected-cars\/4153\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/rsa-connected-cars\/10823\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/rsa-connected-cars\/8425\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/rsa-connected-cars\/8943\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/rsa-connected-cars\/10094\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/rsa-connected-cars\/9833\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/rsa-connected-cars\/14163\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rsa-connected-cars\/14060\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/rsa-connected-cars\/6730\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/rsa-connected-cars\/6260\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/rsa-connected-cars\/9792\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rsa-connected-cars\/14587\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/rsa-connected-cars\/14163\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rsa-connected-cars\/14060\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rsa-connected-cars\/14060\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/amr\/","name":"AMR"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5942"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5942\/revisions"}],"predecessor-version":[{"id":6198,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5942\/revisions\/6198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5943"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}