Hacking cars could be due to the use of HTTP instead of HTTPS

The German automaker BMW recently updated the software of their cars. The patch closes a vulnerability that allowed the doors of 2.2 million cars of the BMW, Mini and Rolls Royce brands to open, without leaving any traces.
The problem arose due to the peculiarities of the implementation of the technology of the infotainment system ConnectedDrive. It also allows car owners to get access to the Internet, to navigation and other services using cellular communications - the GSM module and a permanent SIM card are installed in the car. A user using a smartphone with an installed application can open doors, adjust the air conditioner and perform other actions.
As Reuters
explains , the researchers managed to launch an attack by creating a fake base station. Using the substitution of network traffic hired by the German automobile association
ADAC, the company was able to lower windows and open the doors of vulnerable cars. It only takes a few minutes to complete, without any physical traces of unauthorized access. BMW spokesperson Silke Brigle confirmed that hackers could not start or stop the engine.
ADAC gave BMW enough time to correct this error, and in its press statement, BMW
reports that the vulnerability was quickly closed. An update with a security patch is automatically downloaded when vehicles access the BMW Group servers. Apparently, now the connection between the devices will be made using the encrypted protocol HTTPS, and before that the data went directly via HTTP without any verification of the digital keys.
')
List of affected models.
Hidden textBMW
1 Series Convertible, Coupé and Touring (E81, E82, E87, E88, F20, F21)
2er Active Tourer, Coupé and Convertible (F22, F23, F45)
3 with Convertible, Coupe, GT, Touring and M3 (E90, E91, E92, E93, F30, F31, F34, F80)
4p Coupe, Convertible, Gran Coupe and M4 (F32, F33, F36, F82, F83)
5 Series GT and Touring (F07, F10, F11, F18)
6 Series Gran Coupe Convertible (F06, F12, F13)
7 Series (F01, F02, F03, F04)
I3 (I01), I8 (I12)
X1 (E84), X3 (F25), X4 (F26) X 5 (E70, F15, F85), X6 (E71, E72, F16, F86), Z 4 (E89)
Mini
Three-door and five-door hatchback (F55, F56)
Rolls royce
Phantom Coupe and Drophead Coupe (RR1, RR2, RR3)
Ghost (RR4)
Wraith (RR5)
Car theft and property theft by exploiting the vulnerabilities of keyless entry systems are serious problems often affected by computer security experts. In 2014, in London
alone, there were 6283 such incidents, 17 stolen cars per day and 42% of all types of hijackings. It is reported that attackers use devices designed for auto mechanics, or the necessary information is downloaded from the ODB integrated diagnostics port, after which a fake key is created immediately.