Article Details
Scrape Timestamp (UTC): 2023-12-08 06:35:40.371
Source: https://www.theregister.com/2023/12/08/polish_trains_geofenced_allegation/
Original Article Text
Click to Toggle View
Polish train maker denies claims its software bricked rolling stock maintained by competitor. Says it was probably hacked, which isn't good news either. A trio of Polish security researchers claim to have found that trains built by Newag SA contain software that sabotages them if the hardware is serviced by competitors. Newag, a Polish train maker, emphatically denied that it installed such software in a statement [PDF, Polish] issued Wednesday, attributing any issues to unknown hackers. The rolling stock and engineering business insists its software is correct and that it did not design the trains' programming logic to fail under specific conditions, as has been claimed. "This is a slander from our competition, which is conducting an illegal black PR campaign against us," it protested. Jakub Stępniewicz, Sergiusz Bazański and Michał Kowalczyk – members of Dragon Sector, a Polish security hacking team who go by the names q3k, mrtick, and redford respectively – were hired in May 2022 by Serwis Pojazdów Szynowych (SPS), an independent train maintenance firm, to look into problems with Newag Impuls 45WE trains. SPS bid for and won a contract to maintain the trains, beating Newag, according to Polish industry publication Rynek Kolejowy. SPS then encountered difficulties servicing the rolling stock following a software lockout. According to Bazański (q3k), the trains locked up for no apparent reason after being serviced in third-party workshops. He wrote in a thread on Mastodon that the manufacturer, Newag, argued that these third-party repair shops were deficient and that the manufacturer should be servicing its own trains. The security researchers reverse engineered the train's electronics and, in August 2022 found the train-stopping faults appeared to be not a flaw – but a feature. "We found that the PLC [programmable logic controller] code actually contained logic that would lock up the train with bogus error codes after some date, or if the train wasn't running for a given time," Bazański wrote. "One version of the controller actually contained GPS coordinates to contain the behavior to third-party workshops." They also claimed to have found an undocumented key combination in the cabin controls that would unlock the trains. On Tuesday, the researchers discussed their findings at the Oh My H@ck conference in Warsaw, Poland. The unrecorded talk was documented by infosec writer BadCyber, to whose account the hacking trio referred The Register. They are also preparing a more detailed presentation they intend to deliver at the 37th Chaos Communication Congress in Hamburg, Germany, at the end of the month. CERT Poland confirmed to The Register that the team had disclosed their findings and that the cyber security agency had alerted relevant authorities. That was more than a year ago, and The Register understands that the ongoing lack of action is partly what motivated the researchers to go public with their findings. Janusz Cieszyński, Poland’s former minister of digital affairs, has since explained on social media that the president of Newag contacted him to say that the firm had been victimized by cyber criminals. Cieszyński added that the analysis he saw suggested otherwise.
Daily Brief Summary
Polish train manufacturer Newag SA has denied accusations of deliberately installing software designed to sabotage trains serviced by competitors.
Security researchers hired by an independent maintenance firm, Serwis Pojazdów Szynowych, discovered that Newag's trains presented software-related issues after maintenance by third parties.
The researchers reverse-engineered the train software and claimed to find functionality that would result in the train locking up under certain conditions, which Newag attributes to hacking.
Despite Newag's assertions, the researchers presented their findings at a conference and plan to provide a detailed presentation at an upcoming international congress.
CERT Poland was informed of these findings over a year ago and has alerted the relevant authorities, though no significant action appears to have been taken since then.
The controversy has caught the attention of Poland’s former minister of digital affairs, hinting at the suggestion of sabotage that conflicts with Newag's cybercrime victimization stance.