Hacker hits Toronto transit message system, jabs prime minister
Shea said Exclusive Advertising reacted immediately. Every time we had an incident like that, we took a car out of service and they reprogrammed the message board by deleting the messages and programming in again the correct messages, he said. Now theres a fix for it that, to my knowledge, was not available back six years ago, and its having the programming device password-protected.
Shea said Exclusive Advertising is in the process of password-protecting message boards in all the trains.
Although Shea didnt know exactly how the hacker managed to reprogram the message boards, Greg Donohue, president of Exclusive Advertising, offered some insight.
We have about 800 of these LED scrolling message signs throughout the fleet of trains on the GO system, Donohue said. The signs are programmed via an infrared remote control. When we bought the signs about six years ago, it was relatively new technology -- and at the time the signs werent password-protected.
Donohue said that while anyone with that particular remote control could reprogram the signs back then, it the remote control devices werent available publicly. You had to buy them through a distributor or the manufacturer, and they were sold specifically for industrial use, he said. But whats transpired over the years is that they are becoming available to the public through retail stores, i.e., Sams Club. And you can buy the signs bundled with the remotes through other retail outlets. Because theyre all on the same frequency, anybody that buys the sign and has the remote can reprogram signs. So what you need is to password-protect each one. Thats what were doing now, password-protecting them. So then you need a password to alter the message on the LED screen.
Donohue said he never expected anything like the sign hacking to occur.
Weve had the signs up for six years and were phasing them out because were bringing in flat-screen monitors on the trains, so in another year it wouldnt have mattered, he said.
Some detective work by a Canadian blogger may have discovered the identity of the hacker: a 24-year-old Canadian named Joshua, who talks about the incident on his MySpace page and has received kudos from friends for hacking the signs.
An e-mail to Joshua from Computerworld seeking comment went unanswered.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Cybercrime and Hacking White Papers | Webcasts