Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking

Posted on August 9, 2025August 9, 2025 By CWS

Researchers demonstrated that sensible buses, the transportation automobiles that incorporate varied techniques to enhance security, effectivity, and passenger expertise, could be remotely hacked. 

The findings had been described on Friday on the DEF CON hacker conference by Chiao-Lin ‘Steven Meow’ Yu of Development Micro Taiwan and Kai-Ching ‘Keniver’ Wang of CHT Safety, a Taiwan-based MSSP.

The researchers began digging into the cybersecurity of sensible buses after noticing that free Wi-Fi was accessible for passengers.

An evaluation confirmed that the identical machine-to-machine (M2M) router was used each to offer free Wi-Fi to passengers and for in-vehicle techniques used for Superior Public Transportation Providers (APTS) and Superior Driver Help Methods (ADAS). 

The ADAS makes use of sensors, cameras, radar and LiDAR to help drivers and stop accidents. Its capabilities embrace collision warning, lane departure warning, pace restrict indicator, and site visitors signal recognition, in addition to passenger and driver monitoring for security functions. 

APTS consists of varied elements meant to extend the effectivity of public transport techniques, similar to GPS units that present an correct location of the bus, interfaces for passengers and operators, route and schedule companies, and panels put in at bus stops — all managed by a central system.

The researchers had been capable of simply bypass the on-board router’s authentication and gained entry to its administration interface. Since there was no community segmentation, they had been then capable of transfer to APTS and ADAS performance. 

The specialists found a number of vulnerabilities in these techniques, together with command injections and an MQTT backdoor that enabled distant entry to the bus. Commercial. Scroll to proceed studying.

In the end, Yu and Wang decided {that a} hacker might discover susceptible buses on the web and launch distant assaults.

“As soon as an attacker understands the protocol by way of packet evaluation or related strategies, it’s potential to carry out assaults from the web while not having to be bodily current on the bus,” Yu informed SecurityWeek.

They demonstrated varied eventualities, together with how hackers might monitor the precise location of a bus or entry the onboard digicam, which is protected by easy-to-guess default passwords.

Based on the researchers, by these vulnerabilities hackers might manipulate on-board shows, steal passenger and driver info, and even entry the transportation firm’s servers. 

“The protocols in use (a minimum of in Taiwan) don’t implement any encryption or authentication, even by trade requirements,” Yu defined. “This implies if an attacker is ready to conduct MITM (Man-In-The-Center) assaults, they’ll straight modify or forge the content material.”

The researchers discovered that an attacker can connect with the bus’s techniques and procure info similar to GPS location, engine pace (RPM), and the automobile’s common pace. 

This knowledge could be manipulated and the specialists described a number of theoretical real-world assault eventualities. As an illustration, an attacker might change a automobile’s GPS location, which might lead to emergency response being delayed in case of an accident. A hacker may also falsify the RPM knowledge to cover actual mechanical issues or create spurious ones in an effort to trigger disruption. 

Attackers may also falsify driver and automobile state knowledge to set off false emergency or accident alerts. They might additionally set a false ‘out of service’ standing to disrupt bus schedules and operations. 

The analysis was carried out on buses in Taiwan, however Yu informed SecurityWeek that the susceptible techniques could also be utilized in different nations as properly, based mostly on the truth that the seller presents language choices for Chinese language, English, Japanese and Vietnamese.

The researchers mentioned they tried to responsibly disclose their findings to affected distributors, together with the maker of the router, US-based BEC Applied sciences, and the agency that gives clever transportation options for buses in Taiwan, Maxwin. Nonetheless, they acquired no response and the vulnerabilities seem to stay unpatched. 

Development Micro’s Zero Day Initiative (ZDI) has revealed a number of advisories to explain the vulnerabilities present in BEC routers.

Associated: New HTTP Request Smuggling Assaults Impacted CDNs, Main Orgs, Thousands and thousands of Web sites

Associated: Main Enterprise AI Assistants Can Be Abused for Information Theft, Manipulation

Security Week News Tags:Buses, Free, Hacking, Leaves, Remote, Vulnerable, WiFi

Post navigation

Previous Post: New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox
Next Post: ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data

Related Posts

Company and Personal Data Compromised in Recent Insight Partners Hack  Security Week News
Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage Security Week News
Samsung Announces Security Improvements for Galaxy Smartphones Security Week News
BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software Security Week News
New ClickFix Malware Variant ‘LightPerlGirl’ Targets Users in Stealthy Hack Security Week News
VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Jaguar Land Rover Says Shutdown Will Continue Until at Least Oct 1 After Cyberattack
  • A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York
  • Beware of Fake Online Speedtest Application With Obfuscated JS Codes
  • Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
  • Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Jaguar Land Rover Says Shutdown Will Continue Until at Least Oct 1 After Cyberattack
  • A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York
  • Beware of Fake Online Speedtest Application With Obfuscated JS Codes
  • Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
  • Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News