The U.S. Department of Transportation's National Highway Traffic Safety Administration has released a proposed guidance for improving motor vehicle cybersecurity. Itâs aimed at helping automakers protect their vehicles from cyber-attacks. The federal guidance comes in the wake of a cybersecurity-related recall in July 2015 involving nearly 1.5 million Dodge, Chrysler and Jeep vehicles. It was the result of a Jeep hack. âCybersecurity is a safety issue, and a top priority at the Department,â said U.S. Transportation Secretary Anthony Foxx in NHTSAâs press release on the proposed guidance.
Details
The proposed guidance suggests automakers follow a layered approach to vehicle cybersecurity. The NHTSA says the approach should:- âBe built upon risk-based prioritization identification and protection of safety-critical vehicle control systems and personally identifiable information;
- Provide for timely detection and rapid response to potential vehicle cybersecurity incidents in the field;
- Design-in methods and measures to facilitate rapid recovery from incidents when they occur; and
- Institutionalize methods for accelerated adoptions of lessons learned across the industry through effective information sharing, such as thorough participation in the Auto ISAC.â
2015 Jeep HackÂ
The governmentâs first cybersecurity-related recall came after a reporter for Wired published an article in July 2015 about how he voluntarily let two hacking experts tap into a 2014 Jeep Cherokee he was driving. The experts, Charlie Miller and Chris Valasek, used the reporter to test out a technique theyâd been researching. In a home located 10 miles away from where the reporter was driving, the experts used software to send commands to the Jeep. They were able to remotely manipulate the air-conditioning, radio, windshield wipers and even cut the transmission. âImmediately my accelerator stopped working,â reporter Andy Greenberg wrote in the article. âAs I frantically pressed the pedal and watched the RPMs climb, the Jeep lost half its speed, then slowed to a crawl.â It ended up creating a real traffic headache. âCars lined up behind my bumper before passing me, honking,â said Greenberg. âI could see an 18-wheeler approaching in my rearview mirror. I hoped its driver saw me, too, and could tell I was paralyzed on the highway.â The reporter wrote that the most disturbing maneuver came later on when the hackers cut the Jeepâs brakes. The SUV uncontrollably slid into a ditch as he frantically pumped the pedal. Miller and Valasek later said they were able to remotely hack the multimedia system of the Jeep through Wi-Fi connection.Chrysler Recall
In the reportâs wake, Chrysler issued a recall involving Dodge, Chrysler and Jeep vehicles. The company sent USB drives with a software update to all customers affected. The customers were told to install the update through the port on their vehicleâs dashboard. Chrysler also took steps to block attacks with network-level security measures. While Chrysler said, at the time, it was only aware of the one hacking incident, it led many to question the safety of the companyâs vehicles.2016 Jeep Hack
What didnât help Chryslerâs case is that the hackers returned this past summer with new tricks to show off. Miller and Valasek found a way to turn the Jeep Cherokeeâs steering wheel and cause it to accelerate. This yearâs hack, however, wasnât executed remotely. It required a laptop directly plugged into the Jeepâs network under the vehicleâs dashboard. After plugging in, the pair was able to get the vehicleâs electronics system to listen to commands they were sending. Chryslerâs parent company, Fiat Chrysler Automobiles, responded to the latest hack by noting that it wasnât performed remotely. âWhile we admire their creativity, it appears that the researchers have not identified any new remote way to compromise a 2014 Jeep Cherokee or other FCA US vehicles,â said the company in a statement. The company also said the Jeep the hackers used appeared to have been altered back to an older level of software. While the duo confirmed they installed an older infotainment system, they argued the change didnât make a difference in their latest hack as the work didnât involve that system at all.FCA âBug Bountyâ Program
While Fiat Chrysler is quick to defend the safety of its vehicles, it welcomes tips on security weaknesses. Before Miller and Valasek released information on their latest hack in August, FCA announced in July a new âbug bountyâ program. FCA runs it through a firm called Bugcrowd. The program offers hackers money for information about flaws in its vehicles. âWe will investigate legitimate reports and make every effort to correct any valid vulnerability as quickly as possible,â writes FCA on the site. FCA offers between $150 and $1,500 rewards for the information. It shows the seventh-largest automaker in the world is taking the rising threat of car hacking seriously.FutureÂ
While companies like FCA are clearly taking steps to make cybersecurity a priority, many remain less than confident that automakers are doing enough. The NHTSA hopes the new guidelines it has released encourages more car manufacturers to step up and protect their customers. The NHTSA says the guidelines are based on public feedback it gathered as well as the National Institute of Standards and Technologyâs Framework for Improving Critical Infrastructure Cybersecurity. The public now has a chance to read over and weigh in on the proposed guidance online. The NHTSA will accept comments on the guidance through late November.