On a limited-access roadway in McLean, Virginia, beyond a "Warning" sign identifying a restricted government installation, a four-bay service facility sits in the middle of a cu-de-sac, performing routine maintenance on government vehicles. There is a lower level, however, called "Building 17," that won't even appear in the darkest corners of the Dark Web.
It was in this facility that a vehicle driven by a high-ranking US official was in a bay, under examination by a team of technicians. After unsuccessful attempts to diagnose why the driver experienced runaway acceleration, ineffective braking and steering, members of Dark Tech Investigations were called in. Together, Mike and Ben had over 80 years of experience in automotive and computer technology.
They reviewed the work history: an oil change and tire rotation were the only services performed on the vehicle. A thorough visual inspection revealed no discernible problems. There were no add-on components or systems. The only reason the driver survived was because the vehicle ran out of fuel. Attempts to shift the runaway vehicle into park were ineffective, as were attempts to turn the ignition to OFF.
When a factory scan tool was installed, the investigators observed more phenomena that seemed straight out of a science fiction thriller. Diagnostic fault codes appeared and disappeared. There were blank spots where certain data PIDS should have been. Federal investigators introduced an antivirus program that proved ineffective. The infection persisted, almost like a strain of bacteria that's able to survive extreme antibiotic therapies. Even with every computer replaced, the infection returned. Computer forensics has been crucial in the conviction of terrorists, murderers and other undesirables; but malware introduced for the purpose of controlling vehicles is a new threat to the government experts.
Mike and Ben attempted to recreate the drivability concern and they were successful. The vehicle exhibited runaway acceleration while on the lift. Braking and steering systems were affected. We attempted to record the running data but the critical data streams wouldn't record! That was impossible! Until they discovered that their diagnostic tool became infected! This was the stuff of urban legend; the advanced, persistent threat equivalent of a Sasquatch sighting. This malware had the ability to use high-frequency transmissions to bridge air gaps. Ben and Mike used a CAN payload attack called DARK NEMESIS to search, locate and annihilate the malware. And they were successful. The scan tool and associated software had to be decontaminated. "It is feasible to use high-frequency sounds broadcast over speakers to send network packets," Ben said. Our laptop became infected. And then another laptop became infected.
,
Here is the real nightmare: the infected vehicle was able to infect another nearby vehicle. Now that is in the realm of Dark Technology. Vehicles infecting vehicles, just by being in close proximity with each other, such as in traffic, or in a parking lot. How do you fight that?
No comments:
Post a Comment