Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Hacking the Highway: The Alarming Discovery of Remote Vehicle Control via License Plates



A recent discovery by cybersecurity researchers has revealed a set of critical vulnerabilities in Kia vehicles that could potentially allow hackers to remotely control key functions using only a license plate. The implications are alarming, highlighting the need for urgent attention and action from automotive manufacturers, governments, and consumers alike.


  • A vulnerability in Kia's dealership infrastructure could allow hackers to remotely control key functions of a vehicle using only a license plate.
  • The issue affects any hardware-equipped Kia vehicle made after 2013, with attackers able to gain access to sensitive information such as name, phone number, email address, and physical address.
  • The vulnerability exploits the registration process for a fake account via an HTTP request, generating access tokens that can be used to obtain vehicle owner's information.
  • A hypothetical attack scenario could allow hackers to unlock doors, start engines, and honk horns remotely after around 30 seconds.



  • In a shocking revelation that has left automotive enthusiasts and cybersecurity experts alike reeling, researchers from a prominent cybersecurity firm have uncovered a set of critical vulnerabilities in Kia vehicles that could potentially allow hackers to remotely control key functions of the vehicle using only a license plate. This alarming discovery has significant implications for the safety and security of millions of vehicles on the road, highlighting the need for urgent attention and action by automotive manufacturers, governments, and consumers alike.

    According to a report published recently by The Hacker News, a leading cybersecurity news platform, the vulnerabilities were discovered in Kia's dealership infrastructure, specifically in the "kiaconnect.kdealer[.]com" website used for vehicle activations. The researchers, who have chosen to remain anonymous, revealed that the issues could be exploited remotely on any hardware-equipped vehicle made after 2013, with attackers able to gain access to sensitive information such as the victim's name, phone number, email address, and physical address.

    The crux of the research lies in the fact that the vulnerabilities exploit the Kia dealership infrastructure to register for a fake account via an HTTP request and generate access tokens. These tokens are then used in conjunction with another HTTP request to a dealer APIGW endpoint and the vehicle identification number (VIN) of a car to obtain the vehicle owner's name, phone number, and email address.

    In a hypothetical attack scenario, a bad actor could enter the license plate of a Kia vehicle in a custom dashboard, retrieve the victim's information, and then execute commands on the vehicle after around 30 seconds. This level of control would allow hackers to unlock doors, start engines, and even honk horns remotely, raising serious concerns about the safety and security of vehicles on the road.

    The implications of this discovery are far-reaching and alarming. As one researcher noted, "Cars will continue to have vulnerabilities, because in the same way that Meta could introduce a code change which would allow someone to take over your Facebook account, car manufacturers could do the same for your vehicle." This stark reminder highlights the need for continuous monitoring, testing, and improvement of vehicle security measures to prevent such vulnerabilities from being exploited.

    Fortunately, Kia has taken steps to address the vulnerabilities since June 2024, with patches implemented as of August 14, 2024. However, the fact that these vulnerabilities were ever present in the first place raises questions about the effectiveness of existing security protocols and the need for greater transparency and accountability from automotive manufacturers.

    As consumers, it is essential that we remain vigilant and informed about vehicle security issues, and that we demand more from our manufacturers. The discovery of these vulnerabilities serves as a stark reminder that cybersecurity is not a one-time fix but an ongoing process that requires constant monitoring, testing, and improvement.

    In conclusion, the recent discovery of remote vehicle control via license plates in Kia vehicles is a wake-up call for the automotive industry, governments, and consumers alike. It highlights the urgent need for greater investment in vehicle security measures, continuous monitoring, and testing to prevent such vulnerabilities from being exploited. As we move forward, it is essential that we prioritize transparency, accountability, and consumer protection to ensure that our vehicles remain safe and secure on the road.



    Related Information:

  • https://thehackernews.com/2024/09/hackers-could-have-remotely-controlled.html

  • https://www.carscoops.com/2024/09/millions-of-kia-vehicles-could-have-been-taken-over-in-just-30-seconds/



  • Published: Fri Sep 27 23:20:09 2024 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us