Hacker hits Toronto transit message system, jabs prime minister
Shea said Exclusive Advertising reacted immediately. Every time we had an incident like that, we took a car out of service and they reprogrammed the message board by deleting the messages and programming in again the correct messages, he said. Now theres a fix for it that, to my knowledge, was not available back six years ago, and its having the programming device password-protected.
Shea said Exclusive Advertising is in the process of password-protecting message boards in all the trains.
Although Shea didnt know exactly how the hacker managed to reprogram the message boards, Greg Donohue, president of Exclusive Advertising, offered some insight.
We have about 800 of these LED scrolling message signs throughout the fleet of trains on the GO system, Donohue said. The signs are programmed via an infrared remote control. When we bought the signs about six years ago, it was relatively new technology -- and at the time the signs werent password-protected.
Donohue said that while anyone with that particular remote control could reprogram the signs back then, it the remote control devices werent available publicly. You had to buy them through a distributor or the manufacturer, and they were sold specifically for industrial use, he said. But whats transpired over the years is that they are becoming available to the public through retail stores, i.e., Sams Club. And you can buy the signs bundled with the remotes through other retail outlets. Because theyre all on the same frequency, anybody that buys the sign and has the remote can reprogram signs. So what you need is to password-protect each one. Thats what were doing now, password-protecting them. So then you need a password to alter the message on the LED screen.
Donohue said he never expected anything like the sign hacking to occur.
Weve had the signs up for six years and were phasing them out because were bringing in flat-screen monitors on the trains, so in another year it wouldnt have mattered, he said.
Some detective work by a Canadian blogger may have discovered the identity of the hacker: a 24-year-old Canadian named Joshua, who talks about the incident on his MySpace page and has received kudos from friends for hacking the signs.
An e-mail to Joshua from Computerworld seeking comment went unanswered.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts