Skip to main content

Nissan’s Leaf EV can be hacked from anywhere, with just an Internet connection

Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs
If you drive a Nissan Leaf, you’ll want to pay attention. Heck, if you drive any “connected car,” this story may prove eye opening.

A computer security researcher by the name of Troy Hunt has been able to penetrate the Nissan Leaf’s software with merely a Web browser and Internet connection. Moreover, the regular ol’ Leaf was tapped from thousands of miles away, proving what Hunt hypothesized a while ago.

Recommended Videos

Though the developer was only able to access the Leaf’s HVAC (climate controls and seat heaters), his discovery raises questions about what else might be vulnerable with better resources or more time. Indeed, if the security risks lead to experiments like Chrysler’s UConnect hacking, there may be broader concerns for Leaf owners.

While at a developer conference, Hunt met an attendee who began using Nissan’s smartphone app to control features on his own Leaf not intended by the automaker. What’s worse, the developer could control other people’s Leafs as well.

On Hunt’s webpage, the researcher teams up with friend and Leaf owner Scott Helme to show how he can infiltrate Helme’s Leaf in the U.K., from his home in Australia.

Related: FCA Recalls 1.4 Million Vehicles Amid Hacking Risks

Hunt was able to access the Leaf computer to document recent trips, power usage information, charge levels, and more. He was also able to control the vehicle’s climate controls. While the latter might sound like the perfect recipe for a prank, the available data could also easily be leveraged by criminals, and non-native app functions could conceivably be made available to a skilled programmer.

Hunt showed that access to any Leaf is possible thanks to a shielded code request where the VIN can be exchanged at will. If a hacker gained access to a Leaf’s VIN (via a Web search or a glance at the vehicle’s windshield), they could perform the same experiment on that car.

Oh, and if you assumed that a hacker would be putting themselves at risk by accessing this information, Hunt notes that each API session didn’t contain origin information (it was completely anonymous).

With these findings in hand, Hunt reported the security risks to Nissan. However, as the researcher notes on his site, it’s been over a month and Nissan has yet to resolve the issue. Hunt did clarify that he was able to get in touch with the right people at the automaker post-haste, but the lack of security within the native app is still concerning.

Sure, the present risks to Nissan Leafs aren’t life-threatening (unless you’re driven insane by seemingly autonomous climate controls), but this should serve as a warning for all automotive manufacturers of connected cars: people can and will exploit security gaps.

Miles Branman
Former Digital Trends Contributor
Miles Branman doesn't need sustenance; he needs cars. While the gearhead gene wasn't strong in his own family, Miles…
How Coinbase stopped the Twitter Bitcoin hack from being even worse
twitter and laptop hacked

The hackers behind last week's massive Twitter security breach made off with more than $100,000 through their Bitcoin giveaway scam. But it could have been much worse.

Quick responses from Twitter and Bitcoin exchanges like Coinbase reportedly kept a combined $300,000 away from the hackers' pockets.

Read more
Attacks from Chinese hacking group have spiked, U.S. firm says
hacks header

Attempted cyberattacks from a sophisticated Chinese hacking group have spiked since late January, according to cybersecurity firm FireEye Inc.

FireEye chief security architect Christopher Glyer said more than 75 of its customers were targeted in the attacks across more than a dozen countries, including the United States and Canada. The surge is “one of the broadest campaigns by a Chinese cyber espionage actor we have observed in recent years,” according to a post by FireEye on the cyberattacks.
"We haven’t seen something of this nature in at least three years," Glyer told Digital Trends.
The group behind the attacks was identified as “APT41,” a China-based team made of contractors working on behalf of the Chinese government, Glyer said.

Read more
‘The internet is in no way a part of my job’: Not everyone can work from home
Costco line amid the coronavirus outbreak

Kris, an associate at a Walmart outside Nashville, Tennessee, thinks her mom has the coronavirus, officially known as COVID-19. Her mother works at the same Walmart, and now Kris, who withheld her last name out of fear of losing her job, has no idea whether she should be isolating herself. “She [my mother] has been running a low-grade fever and has been having trouble breathing,” Kris told Digital Trends. “I don’t think I’ve earned enough [paid time off] to cover all my shifts for the whole two weeks of quarantine. Maybe one week.”

Jay, a worker at a Costco outside of Los Angeles, has three kids, the youngest just a year old. He said he constantly worries about bringing the virus home, especially with the crowds in the stores these days making him feel like he works in a stadium. Jay, who has been employed at Costco for 10 years and also withheld his last name, said he has plenty of paid time off saved up to take if he needs to, but he worries about his colleagues, who may not have the same benefits.

Read more