Kill Chain Podcast: Why Exploit Vehicle Vulnerabilities? For Good or for Bad?

Kill Chain Podcast: Why Exploit Vehicle Vulnerabilities? For Good or for Bad?

In this episode, cyber warfare expert and host Terry Reinert discusses vehicle exploits and vulnerabilities that good and bad actors have taken advantage of. We dive into the CAN bus system used by vehicles to connect the many different ECUs or electronic control units within a vehicle. While this system is rugged it is far from perfect when it comes to vehicle cybersecurity. For years, researchers, white hats, and black hat hackers have taken advantage of these vehicle exploits and vulnerabilities. Hosts Terry Reinert, Marcus Quevedo, and Kendall Bricko dive into some of the well-known and not-so-well-known attacks against CAN networks.

The Kill Chain Podcast is a platform cybersecurity and technology podcast. We focus on platforms including fleet vehicles, maritime vessels, aviation, and spacecraft. Platforms cover a wide range of vehicles, industrial control systems, and more. Want to learn more about what ‘platform’ means? Check out our ‘What it Means’ episode of Kill Chain here.

Interested in learning more about the famous vehicle exploits and vulnerabilities mentioned in this episode? Read more about the famous hack on a Jeep Cherokee SUV by Charlie Miller and Chris Valasek on Wired where the story first appeared in 2015.

Wired story about exploits and vulnerabilities of modern passenger vehicles

🧠 What did you think about the different vehicle exploits and vulnerabilities presented in this episode? Are there any specific aspects of the vehicle you’re curious about being exploited? Let us know and we’ll answer your question on a future episode of the Kill Chain Podcast. Reach out via our contact page or click here.