![]() ![]() FlexRay is a set of communication standards jointly developed by a consortium comprising BMW, Philips, Freescale, and Bosch. Currently, it is only used by multimedia devices to transmit information. MOST transfer speeds rates are greater than 10 Mbps, which can meet the demands of various communication and entertainment devices but is costly. Modern cars are typically equipped as follows, shown in Figure 1.Īutomotive architecture systems of modern cars.Īmong these protocols, MOST was developed for in-vehicle use and services multimedia applications. These four automotive buses have different transfer speeds and characteristics on the basis of various applications and requirements. Currently, four mainstream automotive buses are used: Controller Area Network (CAN bus), Local Interconnect Network (LIN), FlexRay , and Media Oriented Systems Transport (MOST). An automotive bus is the communication network that interconnects underlying automotive devices or automotive instruments in the in-vehicle network . An in-vehicle network comprises vehicles outfitted with multiple interconnected processors, coordinating tasks, and shared messages. Conventional end-to-end communications are no longer adequate for the effective management and use of these devices, and in-vehicle networks have gradually become mainstream. In response to people’s demands related to automotive safety, comfort, and entertainment systems, numerous electronic components have been added to vehicles. “At the time of this writing it does not look like the Chimera ransomware is active anymore, but with the success of this (encrypted) distribution method, I would not be surprised to find future malware that utilizes it,” Lawrence Abrams, computer forensics expert and owner of BleepingComputer, wrote in his analysis.Ĭhimera first started infecting systems in Germany earlier this fall, according to security-information site Botfrei.Automotive architecture systems have become increasingly complex and diverse. The subscription channel used by Chimera has reportedly fallen silent this week, suggesting that the ransomware operation may be changing its infrastructure or shutting down. When Chimera has finished encrypting a computer’s data, the program will use a feature of BitMessage, known as a subscription, to act as a communication channel between infected systems and the command-and-control servers. While its threat to publish victims’ private data has fallen flat, the Chimera ransomware’s use of a peer-to-peer encrypted messaging system poses a more significant danger, according to security researchers.Īfter it infects a victim’s system, Chimera will send information about the system and encryption keys to the operator of the scam, according to an analysis in malware information site BleepingComputer. In addition, Wosar, who analyzed the malware, found no code capable of stealing data from victims’ systems. If data is stolen, however, it would mean a great deal of work for the criminals and it could possibly leave a trail back to their operations, making the crime more complex and hazardous. Currently, ransomware is profitable because the attack is very scalable, and infecting and collecting money from a large number of victims is fairly easy. ![]() Yet, security researchers argued that such functionality would be very difficult to efficiently manage. The Chimera ransomware gained attention earlier this month for its operators’ claim that they would publish data stolen from any victim who did not pay the ransom. “The actual payments are done using Bitcoin, so tracking the payments is not more or less difficult than with most other ransomware these days.” “It makes it a lot more difficult to shut the entire operation down, as it is not as simple as finding and closing down the malware author’s server,” he said. While the system is intended to help regular people secure their communications, criminals have adapted the software as well.Ĭhimera uses the peer-to-peer system to collect information about a victim’s system and then invokes a code key to encrypt their data, Chimera makes it much more difficult for investigators to find the servers used to manage the ransomware, Fabian Wosar, a developer for security-software firm Emisoft, told eWEEK in an e-mail interview on Nov. The messaging system, known as BitMessage, is a communications system that allows messages to be encrypted, prevents spoofing and relieves the user of any need for key management. A ransomware program known as Chimera has adopted a relatively unknown peer-to-peer messaging system to communicate with the criminals’ command-and-control server, making investigating the infrastructure more difficult, according to security researchers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |