Last year, two hackers named Charlie Miller and Chris Valasek cracked into a 2014 Jeep Cherokee to show how simple it was for them to take over control of the car while it was being driven by reporter Andy Greenberg. Miller and Valasek reported their results to Chrysler and the auto maker issued a patch for the Chrysler vehicles' onboard electronic control units (ECU). Problem solved? Not so much. (Watch the video here:)
Miller and Valasek now have legitimate hacking gigs working at Uber's Advanced Technology Center studying how malicious hackers can - and will - butt in to vulnerabilities in carmaker's ECUs.
This week, almost one year later, Miller and Valasek are presenting their findings at the Black Hat 2016 security conference in Las Vegas, showing how they were able to take their research the extra mile and were able to wrench Greenberg's control of the same Jeep completely out of his hands. Greenberg had no brakes, no engine, no steering. Although the hack required a direct connection with the native computer, their high-speed control was able to override the Jeep's sensors.
In a paper they plan to publish at the time of their Black Hat talk, Miller and Valasek recommend that automakers take more steps to prevent the manipulations they have demonstrated. Gaining remote access to a car isn't limited to one automaker or one technology, either. Hacking vulnerablities are being found in wireless infotainment platforms, even those little little Internet-connected insurance dongles that plug into a car's dashboard.
Read Wired.com's story The Jeep Hackers Are Back to Prove Car Hacking Can Get Much Worse and watch the videos they have posted showing what the driver sees when loss of control causes the car to crash.