We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
37C3 - Breaking "DRM" in Polish trains
Polish trains' onboard computers hacked, allowing remote control and manipulation. Analysis reveals vulnerability and potential insider involvement. Discover the shocking details of this cybersecurity breach.
- The trains in question failed to start or stopped suddenly, and analysis revealed that the onboard computers were hacked, allowing the trains to be remotely controlled.
- After inspecting the code, it was found that the train’s software was vulnerable to remote hacking and manipulation.
- The hack allowed an attacker to send commands to the train, such as setting the brakes or shutting down the engine.
- The hack was done by someone with knowledge of the train’s internal systems, possibly someone from the train’s manufacturer.
- The Polish train operator who owned the trains, SPS, was not equipped to handle the hack and sent the trains to Nevax for servicing, where the hack was not detected.
- The hack was discovered by a group of hackers who found the trains to be vulnerable and decided to explore the possibilities of hacking them.
- The process of hacking the trains involved using specialized software and tools to access the train’s internal systems.
- The hack was done by someone with knowledge of the train’s internal systems, possibly someone from the train’s manufacturer.
- The hack was discovered by a group of hackers who found the trains to be vulnerable and decided to explore the possibilities of hacking them.
- The hack was remotely detected by the Polish train operator, SPS, who then sent the trains to Nevax for servicing, where the hack was not detected.
- The hack was done by someone with knowledge of the train’s internal systems, possibly someone from the train’s manufacturer.
- The hack was discovered by a group of hackers who found the trains to be vulnerable and decided to explore the possibilities of hacking them.