Hacking Trains
Seems like an old system system that predates any care about security:
The flaw has to do with the protocol used in a train system known as the End-of-Train and Head-of-Train. A Flashing Rear End Device (FRED), also known as an End-of-Train (EOT) device, is attached to the back of a train and sends data via radio signals to a corresponding device in the locomotive called the Head-of-Train (HOT). Commands can also be sent to the FRED to apply the brakes at the rear of the train.
These devices were first installed in the 1980s as a replacement for caboose cars, and unfortunately, they lack encryption and authentication protocols. Instead, the current system uses data packets sent between the front and back of a train that include a simple BCH checksum to detect errors or interference. But now, the CISA is warning that someone using a software-defined radio could potentially send fake data packets and interfere with train operations.
Subscribe to comments on this entry
wiredog • July 16, 2025 1:39 PM
“To exploit this issue, a threat actor would require physical access to rail lines, deep protocol knowledge, and specialized equipment”
All of which are easy to acquire. Physical access to rail lines? There are thousands of miles of rail lines without even a fence. Deep protocol knowledge? Probably published somewhere. Specialized equipment? Software defined radio boards are not hard to get, especially for raspberry pi devices.