Modern cars have all their electronics connected via CANbus (Controller Area Network), a communication protocol used to connect to a car’s ECU. CANbus is used to control everything from stereo systems and electronic seats to a car’s lighting.
In Toyota’s case, thieves are gaining access to the CANbus by plugging in their hacking device into headlight wiring, by simply peeling back fender liners or by drilling holes in them. In some Lexus models, thieves are plugging in via the taillights. In minutes, the thieves use CAN injections, or lines of malicious code, to trick the car’s ECU into thinking a key is present, further unlocking doors and disabling the immobilizer, and finally starting the engine without triggering any alarms.
This doesn't seem like a Toyota oversight, but simply an indicator of which product lines are popular enough to warrant creating the computer code for instrusion and theft. Headlight and taillight wiring doesn't need to be 'hardened' unless the underlying software is vulnerable, and the software is a potential entry point for any brand.
ReplyDelete