{"guid":"27260dd7-65b6-40ec-8929-2b96b45aa368","title":"The Great Train Cyber Robbery","subtitle":"","slug":"32c3-7490-the_great_train_cyber_robbery","link":"https://events.ccc.de/congress/2015/Fahrplan/events/7490.html","description":"\u003cp\u003eFor years SCADA StrangeLove team speaks about vulnerabilities in Industrial Control Systems. Now we want to show by example of railway the link between information security and industrial safety and demonstrate how a root access gained in a few minutes can bring to naught all the years of efforts that were devoted to the improvement of fail-safety and reliability of the ICS system. Railroads is a complex systems and process automation is used in different areas: to control power, switches, signals and locomotives. At this talk we will analyze threats and vulnerabilities of fundamental rail-road automation systems such as computer based interlocking, automatic train control and automatic train protection. No vendor names and vulnerabilities details will be released, for obvious reasons. By the way, all research based on hands-on security exercises and most of issues are confirmed and processed by vendors.\u003c/p\u003e","original_language":"eng","persons":["Sergey Gordeychik","Aleksandr Timorin","repdet"],"tags":["Security"],"view_count":19561,"promoted":false,"date":"2015-12-27T18:30:00.000+01:00","release_date":"2015-12-28T01:00:00.000+01:00","updated_at":"2026-03-30T19:00:08.702+02:00","length":3281,"duration":3281,"thumb_url":"https://static.media.ccc.de/media/congress/2015/7490-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2015/7490-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2015/27260dd7-65b6-40ec-8929-2b96b45aa368-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2015/27260dd7-65b6-40ec-8929-2b96b45aa368-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/32c3-7490-the_great_train_cyber_robbery","url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_title":"32C3: gated communities","conference_url":"https://api.media.ccc.de/public/conferences/32c3","related":[{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":14},{"event_id":1669,"event_guid":"import-2188d0d4e09d0cf34c","weight":4},{"event_id":1737,"event_guid":"OT5cFvmp4WvV3cjuoH1gtQ","weight":5},{"event_id":2147,"event_guid":"OQzXwQcnHSLD9Qd7Iu7Rqw","weight":7},{"event_id":2825,"event_guid":"56721a59-30c0-4201-8744-5d2a9846ed28","weight":2},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":9},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":3},{"event_id":2830,"event_guid":"28891a0d-98d9-484a-bd59-ccea80852b12","weight":2},{"event_id":2896,"event_guid":"ab751ee0-8623-4a20-bab3-f82f8cf3dd82","weight":2},{"event_id":2936,"event_guid":"ff303155-f2fa-4c54-b9aa-ef47cd6e7704","weight":2},{"event_id":2945,"event_guid":"9b641e3f-6d6e-4850-bddd-ced7d67af5c6","weight":2},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":3},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":3},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":2},{"event_id":4270,"event_guid":"c6747c8b-649f-4cad-ae7a-b5bd6138ca3f","weight":4}],"recordings":[{"size":38,"length":3272,"mime_type":"audio/opus","language":"deu","filename":"32c3-7490-de-The_Great_Train_Cyber_Robbery.opus","state":"downloaded","folder":"opus-translation","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T18:27:20.081+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus-translation/32c3-7490-de-The_Great_Train_Cyber_Robbery.opus","url":"https://api.media.ccc.de/public/recordings/8907","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":49,"length":3272,"mime_type":"audio/mpeg","language":"deu","filename":"32c3-7490-de-The_Great_Train_Cyber_Robbery.mp3","state":"downloaded","folder":"mp3-translated","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T17:59:20.802+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3-translated/32c3-7490-de-The_Great_Train_Cyber_Robbery.mp3","url":"https://api.media.ccc.de/public/recordings/8824","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_32c3-7490-en-de-The_Great_Train_Cyber_Robbery.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-15T17:53:09.622+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/DRAFT_32c3-7490-en-de-The_Great_Train_Cyber_Robbery.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/50690","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":444,"length":3281,"mime_type":"video/mp4","language":"deu","filename":"32c3-7490-de-The_Great_Train_Cyber_Robbery.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-16T22:40:28.817+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7490-de-The_Great_Train_Cyber_Robbery.mp4","url":"https://api.media.ccc.de/public/recordings/8584","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":40,"length":3272,"mime_type":"audio/opus","language":"eng","filename":"32c3-7490-en-The_Great_Train_Cyber_Robbery.opus","state":"downloaded","folder":"opus","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T18:18:56.971+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus/32c3-7490-en-The_Great_Train_Cyber_Robbery.opus","url":"https://api.media.ccc.de/public/recordings/8865","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":49,"length":3272,"mime_type":"audio/mpeg","language":"eng","filename":"32c3-7490-en-The_Great_Train_Cyber_Robbery.mp3","state":"downloaded","folder":"mp3","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T18:15:58.370+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3/32c3-7490-en-The_Great_Train_Cyber_Robbery.mp3","url":"https://api.media.ccc.de/public/recordings/8862","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":230,"length":3281,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7490-en-de-The_Great_Train_Cyber_Robbery_webm-sd.webm","state":"downloaded","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:12:19.761+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-sd/32c3-7490-en-de-The_Great_Train_Cyber_Robbery_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/8825","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":476,"length":3281,"mime_type":"video/mp4","language":"eng-deu","filename":"32c3-7490-en-de-The_Great_Train_Cyber_Robbery_hd.mp4","state":"downloaded","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:11:38.357+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7490-en-de-The_Great_Train_Cyber_Robbery_hd.mp4","url":"https://api.media.ccc.de/public/recordings/8585","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":443,"length":3281,"mime_type":"video/mp4","language":"eng","filename":"32c3-7490-en-The_Great_Train_Cyber_Robbery.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:11:37.959+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7490-en-The_Great_Train_Cyber_Robbery.mp4","url":"https://api.media.ccc.de/public/recordings/8583","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":528,"length":3281,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7490-en-de-The_Great_Train_Cyber_Robbery_webm-hd.webm","state":"downloaded","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T21:01:44.670+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-hd/32c3-7490-en-de-The_Great_Train_Cyber_Robbery_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/8776","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":227,"length":3281,"mime_type":"video/mp4","language":"eng","filename":"32c3-7490-en-de-The_Great_Train_Cyber_Robbery_sd.mp4","state":"downloaded","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:11:24.841+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-sd/32c3-7490-en-de-The_Great_Train_Cyber_Robbery_sd.mp4","url":"https://api.media.ccc.de/public/recordings/8448","event_url":"https://api.media.ccc.de/public/events/27260dd7-65b6-40ec-8929-2b96b45aa368","conference_url":"https://api.media.ccc.de/public/conferences/32c3"}]}