Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customize your settings, hit “Customize Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

This article is more than 1 year old

Hacking train Wi-Fi may expose passenger data and control systems

Researcher finds security hotspots on some rail networks

Vulnerabilities on the Wi-Fi networks of a number of rail operators could expose customers' credit card information, according to infosec biz Pen Test Partners this week.

The research was conducted over several years, said Pen Test's Ken Munro. "In most cases they are pretty secure, although whether the Wi-Fi works or not is another matter," he added.

But in a handful of cases Munro was able to bridge the wireless network to the wired network and find a database server containing default credentials, enabling him to access the credit card data of customers paying for the Wi-Fi, including the passenger's name, email address and card details.

He said he was not aware of any incidents of networks being compromised but warned in the worst-case scenario it might be possible for miscreants to take control of the train. "It might be possible, and this is speculation, to lock the braking system."

Munro refused to name the operators affected by the weak security set-up - the vulnerabilities still exist.

The security hole could be prevented by increasing the complexity of login credentials, which often haven't been changed from the default or are too simple.

Lateral thinking, lateral network movement

Munro said weak credentials mean a hacker can also change the routing, potentially allowing them access to more sensitive networks on the train.

Part of the problem is a lack of segregation between the Wi-Fi networks. This could be solved by ensuring passengers can only route traffic from their devices to the internet. The wireless router admin interface should not be accessible to passengers either.

Operators must also check that the admin interface cannot be accessed, which is often available on the gateway IP address. Completely isolated, physically separate hardware for passenger Wi-Fi is preferable.

A separate survey recently found that the majority of consumers are potentially leaving themselves exposed to miscreants by failing to change the password and security setting on their routers.

Infosec bods noted that if an attacker could access the admin interface, they could probably log in by guessing the default password and then change settings, including the Wi-Fi password itself. ®

Similar topics

TIP US OFF

Send us news


Other stories you might like