Companion mobile app exposed Hyundai cars to potential hijacking

The app failed to secure sensitive data could have allowed hackers to remotely locate, unlock, and start vehicles

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock, and start vehicles.

The vulnerability was patched in the latest version of the mobile app released in March but was publicly disclosed on Tuesday. It is the latest in a string of flaws found over the past few years in the "smart" features added by vehicle manufacturers to their cars.

The Hyundai issue was discovered by independent researchers William Hatzer and Arjun Kumar when analyzing the MyHyundai with Blue Link mobile app.

Blue Link is a subscription-based technology that's available for many Hyundai car models released after 2012. It allows car owners to remotely locate their vehicles in case of theft, to remotely unlock them if they lose or misplace their keys, and even to remotely start or stop their engine when they're parked and locked.

The researchers found that starting with version 3.9.4 of the mobile app, released in early December, Hyundai added a feature to upload a log file to a remote server. The connection to the server was not encrypted with HTTPS, but Hyundai attempted to secure the log data by encrypting it with a static key shared by all users.

The problem is that this key is hard-coded inside the application, so anyone can download the app, find the key, and extract it. This allows an attacker who is in a position to intercept traffic from a mobile phone with the application installed to intercept and decrypt the log data.

The application log contains sensitive information like the car owner's username, password, and PIN, as well as GPS data that could disclose the car's location history.

Man-in-the-middle attacks can be executed on insecure wireless networks, through compromised routers, or even higher up in the network chain, if the attacker gains visibility at the ISP level.

Hatzer and Kumar worked with security firm Rapid7 to coordinate the vulnerability disclosure with Hyundai, the U.S. Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), and the CERT Coordination Center at Carnegie Mellon University.

ICS-CERT published an advisory for the issue Tuesday, rating the failure to secure communications against MitM attacks as medium severity and the use of a hard-coded encryption key as high severity.

Hyundai Motor America fixed the flaw in version 3.9.6 of its Blue Link mobile app for Android and iOS. The company told Rapid7 that following its investigation it is not aware of any customers affected by this issue.

Hyundai is a member of the Automotive Information Sharing and Analysis Center (Auto-ISAC), an industry group for sharing information about cybersecurity threats and best practices.

There has been some progress in automotive cybersecurity over the past few years, with several manufacturers launching bug bounty programs and showing their willingness to collaborate with security researchers. However, it will take some time until those efforts start having a significant impact on the quality of car-related software.

To some extent, this is understandable, because car companies are relatively new to software development. Large software vendors like Microsoft, Adobe, and Oracle are still finding and fixing dozens of security flaws in their products every month, so it's not surprising that car software or accompanying mobile apps also have vulnerabilities.

There is some urgency, though, because compared to computers, cars are a bigger threat to human safety. And unfortunately, the flaws being discovered in car software are often basic security oversights that could have easily been avoided by following well-known secure development principles.

In another recent incident, researchers from Israeli firm Argus Cyber Security were able to turn off the engine of a moving car when in Bluetooth range due to a vulnerability in a car monitoring device from Bosch called the Drivelog Connector. This dongle connects to a car's on-board diagnostics (OBD-II) port and monitors its "health" to alert drivers when the car needs servicing. It comes with an accompanying mobile app.

The Argus researchers found an issue in the Bluetooth-based authentication system between the app and the dongle that allowed them to guess the authorization PIN by using brute-force methods after attempting to connect to the dongle once. With the PIN, the researchers found a way to remotely send malicious commands through the dongle to the controller area network (CAN Bus) that's used by the car's electronic control units (ECUs) to communicate.

The CAN Bus doesn't have any encryption or authentication because ECUs need to communicate with each other and react to sensor readings as fast as possible in order to perform critical functions. Because of that, gaining unrestricted access to the CAN Bus is the holy grail for any car hacker.

Unfortunately, previous car hacks have shown that car manufacturers don't properly isolate the CAN Bus from peripheral and remotely accessible systems. In 2015, researchers Charlie Miller and Chris Valasek found a way to hack into the infotainment system of the Jeep Cherokee and other Fiat Chrysler vehicles over a mobile data connection and then jump to the CAN Bus to take over the brake, steering, and other critical systems.

Making cars "smarter" by adding internet connectivity and remotely accessible features can certainly enhance a car owner's experience, but it also increases the cars' attack surface. It's possible that many of these functions will be properly secured in time if car makers continue to take cybersecurity seriously, but for now, it seems more likely that if a car has remote control features, there's an exploitable bug somewhere in the implementation.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?