Feds Warn: Hackers Can Disable Train Brakes via Radio Signals

Feds Warn: Hackers Can Disable Train Brakes via Radio Signals

Last week, the Cybersecurity and Infrastructure Security Agency (CISA) raised alarms regarding a significant vulnerability within our rail systems. The issue is surprisingly straightforward, requiring only a radio and some technical know-how to potentially hack key train operations.

At the heart of this vulnerability is a protocol associated with the End-of-Train (EOT) and Head-of-Train (HOT) systems. These systems utilize a Flashing Rear End Device (FRED) attached to the back of the train, which relays crucial data via radio signals to the locomotive’s HOT device. This communication includes commands for braking, thus directly affecting train safety.

Initially introduced in the 1980s as a replacement for traditional cabooses, these devices unfortunately lack essential encryption and authentication protections. Instead, they rely on basic data packets complemented by a simple BCH checksum to flag errors or interference. Recently, CISA warned that someone with a software-defined radio could manipulate these packets to interfere with train operations.

“A successful exploitation of this vulnerability could enable an attacker to send unauthorized brake commands to the EOT device, potentially causing sudden stops or brake failures,” as detailed in CISA’s advisory.

The vulnerability was brought to CISA’s attention by researchers Neil Smith and Eric Reuter, but what’s alarming is that Smith initially reported this risk back in 2012 to the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), then part of CISA, with little prompted action.

“How severe is this?” Smith remarked on X (formerly Twitter). “You could remotely take control of a train’s braking system from a significant distance with equipment costing under $500, which could lead to derailments or even a nationwide railway shutdown.” His concerns are noteworthy.

According to Smith, there was a stalemate between ICS-CERT and the Association of American Railroads (AAR) from 2012 to 2016. The AAR assessed the risk as too theoretical, requesting real-world proof before any changes would be made.

By 2024, Smith revisited the issue with CISA. While the AAR still viewed the threat as minimal, they finally announced plans to begin upgrading their aging systems by 2026. This development is promising.

Chris Butera, Acting Executive Assistant Director for Cybersecurity, expressed that the vulnerabilities have been known to rail sector stakeholders for over a decade. However, he does note the high barriers to exploitation, which include physical access to rail lines and specialized knowledge and equipment.

CISA is actively collaborating with industry partners to implement mitigation strategies, confirming that a solution is forthcoming.

While the AAR has yet to respond to requests from Gizmodo, this situation highlights the ongoing need for vigilance in cybersecurity within critical infrastructure sectors.

How can train systems be hacked?
Train systems can be compromised by exploiting vulnerabilities in the EOT and HOT protocols, specifically through the manipulation of radio communications and commands.

What vulnerabilities exist in rail cybersecurity?
The major vulnerabilities in rail cybersecurity stem from the lack of encryption and authentication in existing communication protocols, making them susceptible to interference.

Is there a real risk of a train derailment due to cyber threats?
While the potential for remote control of train systems exists, the actual risk of a derailment depends on an attacker’s access to equipment and knowledge, which makes widespread exploitation less feasible.

What measures is CISA taking to address these vulnerabilities?
CISA is working alongside industry partners to develop mitigation strategies and ultimately plan to implement system upgrades to enhance safety.

What should train operators do to secure their systems?
Train operators should invest in updated technology, encryption, and regular cybersecurity audits to protect against emerging threats.

In conclusion, the recent advisory from CISA serves as a crucial reminder of the vulnerabilities within our rail systems. Stay informed about security practices and upgrade systems as needed. For more insights on cybersecurity and infrastructure, feel free to explore more at Moyens I/O.