Charles Murray

July 27, 2015

2 Min Read
Jeep Hack Sparks Massive Recall from Chrysler

The inevitable and ugly rise of car hacking became official last Friday, as Fiat Chrysler Automobiles (FCA) announced the recall of 1.4 million vehicles that could be susceptible to cyberattacks. The first-ever recall for a cyber-vulnerability came four days after Wired broke a story about a successful remote hack attempt on a Jeep Cherokee on a road in St. Louis.

In a statement, FCA said vehicles that employ its 8.4-inch touchscreen with Uconnect service are part of the recall. The company said that some models of the Dodge Viper, Dodge Ram, Jeep Cherokee, Jeep Grand Cherokee, Dodge Durango, Chrysler 200, Chrysler 300, Dodge Charger, and Dodge Challenger use the screen.

2015-Dodge-Challenger-.jpg

The recall arose after hackers working with Wired magazine in a live test successfully took over a Jeep vehicle by hacking its infotainment system. In a written statement, FCA senior vice president Gualberto Ranieri noted that hacking the vehicle was not an easy chore. “It took two security researchers, Charlie Miller and Chris Valasek, months to tap into and control certain systems of (the) SUV,” he wrote. “They are experts.”

MORE FROM DESIGN NEWS: Why Automotive Defect Numbers Are Soaring

FCA said it has already developed, tested, and begun distributing a software patch, and is working openly with the National Highway Traffic Safety Administration (NHTSA) on the issue. “…We proactively opened a dialogue with NHTSA and decided, in an abundance of caution, to continue the distribution under the auspices of a recall,” Ranieri wrote.

Owners of the 1.4 million recalled vehicles will receive a USB drive in the mail with the software patch preloaded on it, FCA said. They are being told that they can upgrade the software themselves or have it done at their dealerships.

An NHTSA statement said that it, working with FCA, promoted the idea of a recall. “NHTSA encouraged this action, which meets the critical responsibility of manufacturers to assure the American public that vehicles are secure from such threats, and that when vulnerabilities are discovered, there will be a swift and strong response,” the agency’s statement said.

Reached for comment on the event, software maker Tripwire suggested to Design News that this case of automotive software hacking is an isolated and unlikely event. “As this is still a relatively new area of security research, we will begin to see more vulnerabilities in vehicle systems,” noted Ken Westin, senior security analyst for Tripwire. “As such, car manufacturers will need to develop safe and secure methods of updating software in these systems, either through dealerships or possibly even remotely.”

MORE FROM DESIGN NEWS: What Can Be Done About Car Hacking?

Senior technical editor Chuck Murray has been writing about technology for 31 years. He joined Design News in 1987, and has covered electronics, automation, fluid power, and autos.

About the Author(s)

Charles Murray

Charles Murray is a former Design News editor and author of the book, Long Hard Road: The Lithium-Ion Battery and the Electric Car, published by Purdue University Press. He previously served as a DN editor from 1987 to 2000, then returned to the magazine as a senior editor in 2005. A former editor with Semiconductor International and later with EE Times, he has followed the auto industry’s adoption of electric vehicle technology since 1988 and has written extensively about embedded processing and medical electronics. He was a winner of the Jesse H. Neal Award for his story, “The Making of a Medical Miracle,” about implantable defibrillators. He is also the author of the book, The Supermen: The Story of Seymour Cray and the Technical Wizards Behind the Supercomputer, published by John Wiley & Sons in 1997. Murray’s electronics coverage has frequently appeared in the Chicago Tribune and in Popular Science. He holds a BS in engineering from the University of Illinois at Chicago.

Sign up for the Design News Daily newsletter.

You May Also Like