Modern public transportation, particularly smart buses, relies on a complex web of interconnected technologies designed to enhance efficiency and safety. However, this interconnectedness has introduced significant cybersecurity vulnerabilities, as recently demonstrated by researchers at a major hacker conference.
The core of the problem lies in the convergence of passenger-facing services, like free Wi-Fi, and critical operational systems, such as Advanced Public Transportation Services (APTS) and Advanced Driver Assistance Systems (ADAS), on a single, unsegmented network. This lack of separation creates a direct pathway for malicious actors to pivot from a seemingly harmless entry point—the passenger Wi-Fi—to vital vehicle controls.
The researchers discovered that the same M2M (machine-to-machine) router that provides internet access for passengers also manages the vehicle’s essential functions. APTS handles the logistics of the bus, including GPS tracking, route scheduling, and passenger information displays.
Meanwhile, ADAS is responsible for driver and passenger safety through collision warnings, lane alerts, and monitoring systems that rely on cameras, radar, and LiDAR. By exploiting a backdoor in the MQTT protocol and bypassing the router’s weak authentication, hackers can gain unauthorized access to this shared network. This allows them to manipulate the systems that are meant to ensure smooth and safe operation, turning a convenience into a major security risk.
Once inside the system, a hacker can remotely access a wide range of sensitive data and controls. The researchers showed that an attacker could track a bus’s location, access on-board cameras with weak passwords, and even alter the digital displays. More alarmingly, the lack of network segmentation allows for the theft and alteration of critical operational data, such as GPS coordinates, engine RPM, and speed. Such manipulation could trigger false alerts for the driver, disrupt scheduling, and ultimately compromise the safety of everyone on board. The ability to breach company servers through the compromised bus system also poses a risk to the broader transportation network and its infrastructure.
The cybersecurity flaws found in these smart bus systems highlight a significant gap in the security protocols of modern vehicle technology. The researchers, Chiao-Lin ‘Steven Meow’ Yu and Kai-Ching ‘Keniver’ Wang, reached out to the manufacturers of the vulnerable components, BEC Technologies and Maxwin, to report their findings. However, they received no response, and the vulnerabilities reportedly remain unpatched. This inaction leaves smart buses susceptible to a variety of cyberattacks, from simple tracking and spying to more dangerous forms of remote control that could endanger passengers and cause significant operational disruptions.
The findings from this research serve as a critical reminder that as vehicles become more connected, cybersecurity must be a primary design consideration, not an afterthought. The integration of technology without proper security measures creates a tempting target for hackers and a serious liability for manufacturers and transportation companies. The path forward requires a collaborative effort from tech companies and transportation providers to implement robust security practices, including network segmentation, stronger authentication protocols, and timely patching of discovered vulnerabilities, to protect the public from these emerging digital threats.
Reference: