marklubi 3 hours ago

Shocking, not shocking. Worked for a company more than two decades ago that ran a lot of shortlines.

Called out several different vulnerabilities that I found while researching how to make things more efficient (the company owning the tracks get charged for the car lease while it's on their tracks).

Nothing came of it though. They were more worried about replacing infrastructure after several cars toppled because the ties had rotted.

xtiansimon 7 hours ago

Don’t know about today, but you used to be able to drop the gates with a nail.

BikDk 8 hours ago

This looks like an exploit for all future train control systems (TCS)

  • IAmBroom 6 hours ago

    Does including a three-letter acronym (TLA) make your answer look informed (ALI)?

    Because it's an article about outdated systems. Radio-controlled systems built in the last ten years, and in the future, are all mandated to be encrypted.

    Furthermore, very few passenger train systems are radio-controlled. Instead, just like cars and buses, control is decentralized to the individual vehicle, and automated based on feedback from the track. No feedback, and the train stops.

senectus1 10 hours ago

>“The End-of-Train (EOT) and Head-of-Train (HOT) vulnerability has been understood and monitored by rail sector stakeholders for over a decade. To exploit this issue, a threat actor would require physical access to rail lines, deep protocol knowledge, and specialized equipment, which limits the feasibility of widespread exploitation—particularly without a large, distributed presence in the U.S.

Sure, thats reaaaally unlikely hey... /S

bestouff 10 hours ago

USA trying to make is public transport system even less popular.