Vehicle Hacking with Derrick Thiecke
Easy Prey21 Des 2022

Vehicle Hacking with Derrick Thiecke

We understand that hackers look for weaknesses in networks to manipulate or take data, but understanding the ways that vehicles can also be accessed either remotely or physically can be a bit surprising.

Today's guest is Derrick Thiecke. Derrick works as an Embedded Systems Security Tester in the automotive industry where he found himself after spending over a decade in the corporate IT world. When Derrick isn't data dumping ROM chips, scouring through vehicle log data, or fuzzing CAN networks, he can be found as a brief blur passing by you on the highway.

Show Notes:
  • [0:58] - Derrick shares his background and current role as a security tester for automotive controllers and devices.
  • [3:30] - There are differences between vehicle networks and home networks. The main network for vehicles is CAN bus.
  • [5:12] - Because it is a bussed network, Derrick explains how all devices on the network can access all the data.
  • [6:50] - Previously, you had to have physical access to hack a car, but not anymore.
  • [8:19] - Derrick describes how his own vehicle accesses data on a network.
  • [9:56] - The implementation of standards has changed the way vehicles are serviced.
  • [11:18] - Safety critical features are isolated, but some things can still be accessed that can be harmful.
  • [12:29] - There was an event in 2015 where a parking feature was hacked while the vehicle was in motion.
  • [13:59] - There are ways to communicate with and change the fuel mapping over CAN bus, but there is usually a physical component required.
  • [16:07] - Derrick describes a scenario that creates a potential threat.
  • [19:04] - The automotive industry typically sits about a decade behind in technology.
  • [21:24] - Derrick lists some of the features in a vehicle that are connected to a network.
  • [23:18] - The number of vehicle recalls due to software issues has increased since 2015, but the issues aren't growing.
  • [25:01] - Movies depict vehicle hacking as possible disasters. Derrick shares his concerns.
  • [26:44] - When ransomware became a problem, we had the same questions. The threat for the worst case scenario is plausible.
  • [28:31] - Derrick describes the most concerning problem he has experienced as a tester.
  • [30:59] - Different cars all use the same controllers, even those without the same features.
  • [32:26] - There are devices that can unlock vehicles without the key or keyfob.
  • [34:18] - When there is an issue with a computer, typically there is an update to solve it. That currently isn't the case for most vehicles.
  • [35:41] - There are some updates that can happen remotely, but the catch-22 is that the wireless connection makes the vehicle susceptible to threats.
  • [37:02] - There is a huge shortage of workforce in this industry.
  • [38:41] - Derrick recommends the book The Car Hacker's Handbook if you are interested in this field.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Episoder(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mar 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mar 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mar 45min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
stopp-verden
fotballpodden-2
rss-gukild-johaug
lydartikler-fra-aftenposten
nokon-ma-ga
det-store-bildet
hanna-de-heldige
dine-penger-pengeradet
rss-ness
rss-espen-lee-usensurert
aftenbla-bla
e24-podden
rss-dannet-uten-piano
rss-penger-polser-og-politikk
frokostshowet-pa-p5