Polish hackers from Dragon Sector informed the 37th Chaos Communication Congress (37C3) late final 12 months how they’d hacked into digital rights administration (DRM) for trains, and, extra importantly — why.
Why Polish hackers broke into trains
Round 5 years in the past, Poland’s Koleje Dolnośląskie (KD) rail operator purchased 11 Impuls 45WE trains from home producer Newag. Quick-forward to current instances, and after 5 years of heavy use it was time for a service and a few upkeep: a somewhat complicated and costly course of {that a} prepare has to bear after clocking up 1,000,000 kilometers.
To pick out a workshop to service the trains, KD organized a young. Newag was among the many bidders, however they misplaced to Serwis Pojazdów Szynowych (SPS), which underbid them by a major margin.
Nonetheless, as soon as SPS was accomplished with servicing the primary of the trains, they discovered that it merely wouldn’t begin up any extra — regardless of seeming to be fantastic each mechanically and electrically. Every kind of diagnostic devices revealed that the prepare had zero defects in it, and all of the mechanics and electricians that labored on it agreed. Regardless of: the prepare merely wouldn’t begin.
Shortly after, a number of different trains serviced by SPS — plus one other taken to a special store — ended up in the same situation. That is when SPS, after making an attempt repeatedly to unravel the thriller, determined to herald a (white-hat) hacker workforce.
Inside the motive force’s cabin of one of many Newag Impuls trains that have been investigated. Supply
Producer’s malicious implants and backdoors within the prepare firmware
The researchers spent a number of months reverse-engineering, analyzing, and evaluating the firmware from the trains that had been bricked and people nonetheless working. Because of this, they discovered tips on how to begin up the mysteriously broken-down trains, whereas on the similar time discovering plenty of attention-grabbing mechanisms embedded within the code by Newag’s software program builders.
For instance, they discovered that one of many trains’ pc techniques contained code that checked GPS coordinates. If the prepare spent greater than 10 days in any certainly one of sure specified areas, it wouldn’t begin anymore. What have been these areas? The coordinates have been related to a number of third-party restore retailers. Newag’s personal workshops have been featured within the code too, however the prepare lock wasn’t triggered in these, which suggests they have been most likely used for testing.
Areas on the map the place the trains can be locked. Supply
One other mechanism within the code immobilized the prepare after detecting that the serial variety of one of many elements had modified (indicating that this half had been changed). To mobilize the prepare once more, a predefined mixture of keys on the onboard pc within the driver’s cabin needed to be pressed.
An additional attention-grabbing booby entice was discovered inside one of many trains’ techniques. It reported a compressor malfunction if the present day of the month was the 21st or later, the month was both 11th or later and the 12 months was 2021 or later. It turned out that November 2021, was the scheduled upkeep date for that exact prepare. The set off was miraculously prevented as a result of the prepare left for upkeep sooner than deliberate and returned for a service solely in January 2022, the 1st month, which is clearly earlier than 11th.
One other instance: one of many trains was discovered to comprise a tool marked “UDP<->CAN Converter”, which was related to a GSM modem to obtain lock standing data from the onboard pc.
Essentially the most often discovered mechanism — and we must always observe right here that every prepare had a special set of mechanisms — was designed to lock the prepare if it remained parked for a sure variety of days, which signified upkeep for a prepare in lively service. In complete, Dragon Sector investigated 30 Impuls trains operated by KD and different rail carriers. A whopping 24 of them have been discovered to comprise malicious implants of some type.
One of many researchers subsequent to the prepare. Supply
Tips on how to defend your techniques from malicious implants
This story simply goes to point out that you could encounter malicious implants in essentially the most sudden of locations and in all types of IT techniques. So, it doesn’t matter what form of venture you’re engaged on, if it comprises any third-party code — not to mention a complete system based mostly on it — it is smart to at the very least run an data safety audit earlier than going reside.


