Hackers have found a way to hack into a Mitsubishi vehicle in another worrying demonstration of the vulnerabilities affecting connected cars.
Pen Test Partners found that the Mitsubishi Outlander plug in hybrid electric vehicle (PHEV) could be hacked into due to the wi-fi connection it uses to pair with mobile devices.
Rather than using a GSM module that would allow it to connect directly to cellular services such as 3G and 4G, the car features a wi-fi access point which a mobile device can connect through.
This creates certain security problems; for one thing, Pen Test Partners found that the access key could easily be cracked as it is "too simple and too short".
To hack the car, the firm used this code and captured the handshake between one of the mobile devices and the car. The handshake, which means the automatic process of negotiation between the device and the server to set the configurations and parameters for the communication channel, could be found by forcing the paired mobile device to decouple from its normal wi-fi connection so that it would automatically connect to the car.
Once connected, the hackers were able to turn the lights on the car on and off and interfere with the car’s charging programme, which could force the car to charge using premium rate electricity. They also managed to turn the air conditioning and heating on and off to order.
Finally, they managed to turn off the car alarm.
The hack demonstrates the security dilemma thrown up by connecting vehicles to the internet.
Pen Test Partners said that as a short-term fix, car owners needed to unpair all mobile devices that have been connected to the car’s access point.
In the medium term, Pen Test Partners said that Mitsubishi should deploy new firmware to fix this problem. In the longer term, the firm said Mitsubishi should completely re-engineer the connection method.
Pen Test Partners said that attempts to alert Mitsubishi had been greeted with a lack of interest until the BBC became involved.