Compromising Electronic Logger & Creating Truck2Truck Worm

Jake Jepson, Rik Chatterjee

DEF CON 32 Main Stage · Day 1 · Main Stage

Jake Jepson and Rik Chatterjee, master’s students from Colorado State University, presented groundbreaking research at DEF CON 32 detailing the first known wireless drive-by attack on a heavy-duty truck. Their talk, "Compromising Electronic Logger & Creating Truck2Truck Worm," unveiled critical vulnerabilities in **Electronic Logging Devices (ELDs)**, essential components of commercial vehicles mandated to record drivers' hours of service. This research highlights a significant security gap in critical infrastructure, demonstrating how a widespread device, designed for compliance, can be weaponized to remotely control a truck's engine.

AI review

Jepson and Chatterjee delivered a groundbreaking technical research talk, demonstrating the first known wireless drive-by attack on a heavy-duty truck's Electronic Logging Device (ELD). Their meticulous reverse engineering of a widely deployed ELD exposed critical vulnerabilities, including hardcoded credentials, unsigned firmware, and a secret Telnet command for arbitrary CAN message injection. The live demo of remotely slowing a truck through its engine control unit is a stark, actionable warning about the severe cybersecurity negligence in critical infrastructure and the potential for a…

Watch on YouTube