Llame al (888) 572-7520 para hablar con un agente

The National Freight Vehicle Traffic Association organized a demonstration to prioritize the protection of tractor-trailer systems.

On October 24, the National Freight Vehicle Traffic Association (NMFTA) organized a wireless hacking demonstration to exemplify how someone could take advantage of the vulnerabilities of cargo trailers and trailers.

At its Cybersecurity Digital Solutions Conference, NMFTA provided a demonstration for the event with a United Petroleum Transports tanker truck that was located several blocks from the main conference site. Ben Gardiner, senior cybersecurity research engineer at NMFTA, who carried out the demonstration, said the hack was performed using a relatively inexpensive setup.

The hacking attempt carried out by Gardiner focused on the trailer brakes, allowing audible information to be obtained that the objective had been achieved. The trailer brakes began making a regular, high-pitched sound shortly after the hack began as they discharged their pneumatic air supply.

He also pointed out that the hack used the trailer’s electrical network, which functions as a wireless interface despite not having been designed for it. This means that a hacker could attack a truck wirelessly without using obvious methods such as Bluetooth or Wi-Fi.

Gardiner explained at the conference that for the demonstration a very simple antenna was used and cables were attached to nearby traffic cones, in order to carry out the attack on the tractor-trailer with the help of a 50-volt power amplifier that It ran at a power of around 15 W. This hack had an estimated cost of $300, demonstrating how simple it can be to carry out in real life.

He highlighted that hackers could also use mobile equipment to assault moving vehicles from further away, sending arbitrary data to all devices on the power grid: trailer, tractor and telematics.

The NMFTA noted that trailer brakes feature converter chips, the code of which is based on technologies from decades past that originally did not require authentication or authorization. This technology has been present on trailers nationwide since 2001 and is expected to remain in effect for the next tractor-trailer interface standard.

With this demonstration, fleets are expected to prioritize firewalls and other mechanisms to protect their truck systems.

Facebook
Twitter
LinkedIn
WhatsApp

10 Responses

  1. Thanks for some other great post. The place else may just anybody get
    that kind of info in such an ideal method of writing?
    I have a presentation subsequent week, and I am on the look for such information.

  2. I have been exploring for a bit for any high-quality articles
    or weblog posts in this kind of area . Exploring in Yahoo I eventually
    stumbled upon this site. Reading this info So i’m glad to convey that I’ve an incredibly good uncanny feeling I
    found out just what I needed. I most indisputably will make certain to do not fail to
    remember this site and give it a glance on a constant basis.

  3. I think that is one of the so much significant information for me.
    And i’m glad studying your article. But should remark on some general things, The site taste is ideal, the articles is in point of fact excellent : D.
    Excellent job, cheers

Leave a Reply

Your email address will not be published. Required fields are marked *

Business hours: Monday to Friday from 8:00 AM to 5:00 PM. California time
Leave your number and a member of our company will contact you
Horario de atención: Lunes a viernes de 8.00 AM a 5.00 PM. Hora california

Deje su número y un miembro de nuestra empresa se pondrá en contacto con usted