Can Hackers Control Self-Driving Cars? Here’s the Scary Truth

A Jeep was hacked from miles away. Discover how hackers can control self-driving cars and what this means for the future of road safety.

A driver on the highway noticed the car acting strange. The day was warm. He was driving at highway speed and everything seemed normal. Then the vents blew at full power. The radio jumped to a loud station without warning. He hit the power button. The radio kept playing. The windshield wipers started even though it wasn’t raining. Wiper fluid smeared the windshield.

Jeep infotainment screen during security test
A screenshot of the Jeep’s infotainment screen during the test.

A photo of two men suddenly flashed on the car’s screen. The driver realized that this was not a simple bug. He learned the car was part of a planned test. But when the test became dangerous, it stopped being a test.

Table of Contents

The Jeep Hack That Shocked Everyone

This really happened. In 2015 security researchers showed they could reach a Jeep Cherokee remotely. They used the car’s internet connection to reach the entertainment unit. From there they worked their way into the car’s other systems. They sent commands to the transmission and engine controls. They made the car slow down until it crawled on an overpass with no shoulder. Traffic built up behind the car. A large truck loomed dangerously close. The driver could not accelerate. The accelerator had no effect.

At first the researchers only toyed with the radio and vents. Then they disabled the transmission. Later they tested the brakes in a controlled area. In one test the brakes were disabled and the car slid into a ditch. The team could track the car’s GPS and watch its route in real time. They could switch controls on or off. They could send commands to the car without touching it.

How Hackers Took Control Step by Step

Modern cars have a computer in the dashboard. That unit controls music, navigation, phone calls, and even Wi-Fi. In some cars that unit is called Uconnect. It connects to the internet through a cellular network. The researchers found a weak point in that connection.

From the internet they reached the head unit. Then they modified its software to run their code. That code could communicate with the CAN bus. The CAN bus is the car’s internal command network. It tells the brakes, engine, and steering what to do. Once they could send messages on the CAN bus, they could control the car’s systems. If you want a broader primer on this kind of testing, see our guide to penetration testing.

How Many Cars Could Be Hacked

The researchers used inexpensive tools. A basic phone acted as a hotspot. A laptop scanned the mobile network for vulnerable head units. When they found one, they could see the vehicle’s IP, VIN, and approximate GPS coordinates. They could map the car’s location. They kept scanning until they found targets. Their tests suggested many vehicles were reachable this way.

That meant the problem was not limited to one car. It could affect many cars of the same make and model. In other words, one vulnerability could allow remote access to many cars. This is one reason people studying IoT attacks worry about connected vehicles.

Why Car Hacks Are Dangerous

When your phone is hacked, you may lose data. That is bad. When your car is hacked, you can lose control. That is far worse. A car can kill people. If a hacker can stop the engine, disable the brakes, or alter the steering, people can be hurt or killed.

Now imagine many cars are connected the same way. A hacker could target a group of vehicles. That could cause pileups, citywide traffic chaos, or worse. The risk grows as cars become smarter and more connected.

Warning! If you suspect your car is being tampered with, pull over safely and seek help immediately.

More Real-World Car Hacks

  • Researchers have reported taking over infotainment systems and door locks.
  • In one case, an insider used a remote system to disable many cars and set their horns blaring.
  • Security contests have shown some electric vehicles can be controlled through weak points in apps or key fobs. For more on app and key-fob risks see our guide to application security.

These examples show the problem is wider than a single brand or model.

How Automakers Responded

After the Jeep demo, the automaker released a software patch. They also issued a recall for many vehicles. They patched the network so that specific attack could no longer work over that carrier.

But the patch had limits. Owners had to install it by USB or visit a dealer to get it installed. That made the fix slow and difficult. Many cars likely remained unpatched.

Since then many automakers have started hiring security teams. Some have set up bug bounty programs. Others now test cars with outside researchers. Governments began asking questions and proposing rules for automotive cybersecurity. If you run or advise a small company, see our short guide to building a cyber security plan for small businesses to understand how rules translate into practice.

Why Car Updates Can Fail

Software patches only help if people install them. If a patch is manual, many owners will delay or skip installing it. If the car needs a dealer visit, many owners will not go. That leaves many cars vulnerable for a long time.

Over-the-air updates are better. They can reach cars automatically and quickly. But they must be delivered securely. A weak update system could become a new attack path. For how organizations think about secure updates and risk, see our piece on NIST Cybersecurity Framework and related guidance.

Over-the-air updates reduce friction — but only when they are secure and properly tested.

How Drivers Can Protect Themselves

  • Install updates as soon as they arrive.
  • Change default passwords on car apps and systems.
  • Turn off Wi-Fi and Bluetooth when you don’t need them.
  • Be careful with third-party apps that link to your car.
  • If your car behaves oddly, pull over safely and get help.
  • Ask your dealer how updates are delivered and whether your car is patched.

Also, avoid using public Wi-Fi for sensitive app activity. If you do need protection on public networks, a VPN can help — see our Surfshark VPN review for one option. These steps will not stop every attack, but they reduce risk today.

Read our cyber security plan

What Automakers Should Do

Experts say automakers must build security in from the start. That means:

  • Separate entertainment systems from driving systems.
  • Monitor the internal network for suspicious commands.
  • Allow independent security teams to test cars.
  • Provide secure, user-friendly over-the-air updates.
  • Reward researchers who report bugs rather than threaten legal action.

These steps help limit damage if a breach occurs. They also make it harder for attackers to move from one system to another. For more on incident readiness and response options, check our guide to incident response companies.

Lawmakers and Rules

The Jeep case pushed lawmakers to act. Senators and agencies questioned automakers about their security practices. New guidelines and proposed rules aim to set a baseline for car cybersecurity. The goal is to protect drivers and push the industry to build safer systems.

See the Hack in Action

To see how real this problem is, watch the short video of the Jeep test. It shows what can happen when a connected car is controlled remotely:

What to remember

Yes — hackers can take control of cars. It has happened before. The Jeep example proves this point. The attack showed a clear path: reach the head unit, modify firmware, connect to the CAN bus, and send commands to the car.

The positive parts are: the researchers told the automaker, the automaker released a patch, and lawmakers pushed for rules. The industry is learning and improving. But fixes are not perfect. Many cars still need manual patches, and many owners still do not update. That leaves a security gap.

If you own a connected car, treat it like a computer. Update it. Lock it down. Ask questions. Tell your dealer you want secure over-the-air updates. If your car acts strange, take it seriously and get help.

What do you think? Are automakers moving fast enough to protect drivers? Share your thoughts in the comments. For more simple guides on vehicle security, check other posts on TerminalTools.

Post a Comment