Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking

Posted on August 9, 2025August 9, 2025 By CWS

Researchers demonstrated that sensible buses, the transportation automobiles that incorporate varied techniques to enhance security, effectivity, and passenger expertise, could be remotely hacked. 

The findings had been described on Friday on the DEF CON hacker conference by Chiao-Lin ‘Steven Meow’ Yu of Development Micro Taiwan and Kai-Ching ‘Keniver’ Wang of CHT Safety, a Taiwan-based MSSP.

The researchers began digging into the cybersecurity of sensible buses after noticing that free Wi-Fi was accessible for passengers.

An evaluation confirmed that the identical machine-to-machine (M2M) router was used each to offer free Wi-Fi to passengers and for in-vehicle techniques used for Superior Public Transportation Providers (APTS) and Superior Driver Help Methods (ADAS). 

The ADAS makes use of sensors, cameras, radar and LiDAR to help drivers and stop accidents. Its capabilities embrace collision warning, lane departure warning, pace restrict indicator, and site visitors signal recognition, in addition to passenger and driver monitoring for security functions. 

APTS consists of varied elements meant to extend the effectivity of public transport techniques, similar to GPS units that present an correct location of the bus, interfaces for passengers and operators, route and schedule companies, and panels put in at bus stops — all managed by a central system.

The researchers had been capable of simply bypass the on-board router’s authentication and gained entry to its administration interface. Since there was no community segmentation, they had been then capable of transfer to APTS and ADAS performance. 

The specialists found a number of vulnerabilities in these techniques, together with command injections and an MQTT backdoor that enabled distant entry to the bus. Commercial. Scroll to proceed studying.

In the end, Yu and Wang decided {that a} hacker might discover susceptible buses on the web and launch distant assaults.

“As soon as an attacker understands the protocol by way of packet evaluation or related strategies, it’s potential to carry out assaults from the web while not having to be bodily current on the bus,” Yu informed SecurityWeek.

They demonstrated varied eventualities, together with how hackers might monitor the precise location of a bus or entry the onboard digicam, which is protected by easy-to-guess default passwords.

Based on the researchers, by these vulnerabilities hackers might manipulate on-board shows, steal passenger and driver info, and even entry the transportation firm’s servers. 

“The protocols in use (a minimum of in Taiwan) don’t implement any encryption or authentication, even by trade requirements,” Yu defined. “This implies if an attacker is ready to conduct MITM (Man-In-The-Center) assaults, they’ll straight modify or forge the content material.”

The researchers discovered that an attacker can connect with the bus’s techniques and procure info similar to GPS location, engine pace (RPM), and the automobile’s common pace. 

This knowledge could be manipulated and the specialists described a number of theoretical real-world assault eventualities. As an illustration, an attacker might change a automobile’s GPS location, which might lead to emergency response being delayed in case of an accident. A hacker may also falsify the RPM knowledge to cover actual mechanical issues or create spurious ones in an effort to trigger disruption. 

Attackers may also falsify driver and automobile state knowledge to set off false emergency or accident alerts. They might additionally set a false ‘out of service’ standing to disrupt bus schedules and operations. 

The analysis was carried out on buses in Taiwan, however Yu informed SecurityWeek that the susceptible techniques could also be utilized in different nations as properly, based mostly on the truth that the seller presents language choices for Chinese language, English, Japanese and Vietnamese.

The researchers mentioned they tried to responsibly disclose their findings to affected distributors, together with the maker of the router, US-based BEC Applied sciences, and the agency that gives clever transportation options for buses in Taiwan, Maxwin. Nonetheless, they acquired no response and the vulnerabilities seem to stay unpatched. 

Development Micro’s Zero Day Initiative (ZDI) has revealed a number of advisories to explain the vulnerabilities present in BEC routers.

Associated: New HTTP Request Smuggling Assaults Impacted CDNs, Main Orgs, Thousands and thousands of Web sites

Associated: Main Enterprise AI Assistants Can Be Abused for Information Theft, Manipulation

Security Week News Tags:Buses, Free, Hacking, Leaves, Remote, Vulnerable, WiFi

Post navigation

Previous Post: New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox
Next Post: ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data

Related Posts

Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Security Week News
Recent Langflow Vulnerability Exploited by Flodrix Botnet Security Week News
Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage  Security Week News
Airoha Chip Vulnerabilities Expose Headphones to Takeover Security Week News
Adobe Patches Critical Code Execution Bugs Security Week News
Google Discloses Data Breach via Salesforce Hack  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
  • ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data
  • Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking
  • New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox
  • Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
  • ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data
  • Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking
  • New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox
  • Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News