37C3 - Breaking "DRM" in Polish trains

Polish trains' onboard computers hacked, allowing remote control and manipulation. Analysis reveals vulnerability and potential insider involvement. Discover the shocking details of this cybersecurity breach.

Key takeaways
  • The trains in question failed to start or stopped suddenly, and analysis revealed that the onboard computers were hacked, allowing the trains to be remotely controlled.
  • After inspecting the code, it was found that the train’s software was vulnerable to remote hacking and manipulation.
  • The hack allowed an attacker to send commands to the train, such as setting the brakes or shutting down the engine.
  • The hack was done by someone with knowledge of the train’s internal systems, possibly someone from the train’s manufacturer.
  • The Polish train operator who owned the trains, SPS, was not equipped to handle the hack and sent the trains to Nevax for servicing, where the hack was not detected.
  • The hack was discovered by a group of hackers who found the trains to be vulnerable and decided to explore the possibilities of hacking them.
  • The process of hacking the trains involved using specialized software and tools to access the train’s internal systems.
  • The hack was done by someone with knowledge of the train’s internal systems, possibly someone from the train’s manufacturer.
  • The hack was discovered by a group of hackers who found the trains to be vulnerable and decided to explore the possibilities of hacking them.
  • The hack was remotely detected by the Polish train operator, SPS, who then sent the trains to Nevax for servicing, where the hack was not detected.
  • The hack was done by someone with knowledge of the train’s internal systems, possibly someone from the train’s manufacturer.
  • The hack was discovered by a group of hackers who found the trains to be vulnerable and decided to explore the possibilities of hacking them.