@kentindell I'm looking for evidence. I suspect a modified ECU has given an attacker wireless control over the braking system or ABS wheel speed sensors in a Nissan. Should I be looking for modified code or a CAN injection tool?
Bezos and Musk have it deeply wrong.
The problem isn't that we need a trillion people to have more Einsteins or Mozarts.
The problem is we don't nurture and protect the ones we have.
Stephen Jay Gould wrote: "I am, somehow, less interested in the weight and convolutions of Einstein's brain than in the near certainty that people of equal talent have lived and died in cotton fields and sweatshops".
If an ECU has been modified and hacked what component would enable wireless communication between it and the hacker? Specifically hacking of the brakes in a Nissan ECU?
Even using one’s key fob can initiate the spoofing attack on the affected vehicle and any other affected vehicles within range.
The technique appears to be universal and works the same way on multiple vehicles, across multiple brands. The only thing they need to have in common is the use of a smart key fob. Control of the attack is integrated into the vehicles that are affected. Since control occurs through the smart key and/or the stereo system a user could unknowingly initiate a spoofing attack on a nearby vehicle without any knowledge or intent to do so simply by using his or her own stereo normally.
Unlike the CAN bus injection tools sold on the dark web and surreptitiously installed on a victim vehicle this form of attack appears to be more of a “technique” involving dangerous rewiring of the ABS wheel speed sensor harness, the throttle position sensor harness, the smart key harness and the stereo system harness.
Stealth ABS Wheel Speed Sensor Spoofing Attack.
This investigation is still on-going so if anyone has any idea how this is done please feel free to chime in.
This form of spoofing attack uses pre-existing electronic systems already integrated into modern vehicles in order to disrupt the ABS wheel speed sensor data.
The volume knob increases the amplification of the disruptive magnetic field. The quick select buttons on the CD player (buttons 1-4) send the spoofing signal to the wheel assigned to each button (i.e. button 1 is pegged to the front left wheel, button 2 rear left, button 3 front right, button 4 rear right). In mode 2 quick select buttons 5 on the CD player switches the hack into mode 1 (key fob control).
Commands are sent to the victim vehicle using three available vulnerabilities enabled through the hack. 1) Android wireless link directly to the victim CAN bus and all systems; 2) Any standard North American key fob operating on a 315 MHz frequency (this option also utilizes preset commands that peg key fob button combinations to vehicle stability control systems but requires the “follow vehicle” to be within closer range), and; 3) Radio transmitter with amplified antenna
If you had an opportunity to discuss vehicle cybersecurity with a government minister or cabinet secretary what are the top questions you would pose?