Spoofed Radio Commands Halt Polish Trains in Apparent Sabotage

Spoofed Radio Commands Halt Polish Trains

In a peculiar turn of events, more than 20 trains across Poland were suddenly stopped over two days, August 25 and 26, in a situation initially deemed a “cyberattack” by Polish media and the BBC. The disruption, reportedly in support of Russia, impacted Poland’s railway system, a crucial conduit for NATO’s logistical support to Ukraine.

The saboteurs seemingly employed what was first thought to be a cyberattack, interspersing their actions with the Russian national anthem and portions of a speech by President Vladimir Putin. However, upon investigation, cybersecurity researchers revealed that the attack did not involve traditional cyber techniques. Instead, it appears the perpetrators employed simple “radio-stop” commands via radio frequency to immobilize the targeted trains. Lukasz Olejnik, an independent cybersecurity researcher, highlighted that the affected trains’ communication systems lack encryption or authentication for incoming commands. As a result, anyone equipped with basic off-the-shelf radio equipment—costing as little as $30—can transmit the necessary signal, consisting of a sequence of three acoustic tones at a frequency of 150.100 megahertz. It triggers the trains’ emergency stop function, causing them to halt abruptly.

Olejnik emphasized that this approach has been discussed within Polish radio and train communities for years and is not a novel discovery. The vulnerabilities stem from the reliance on a relatively unprotected VHF 150 MHz radio system, which the saboteurs exploited. The main limitation of this tactic is the need for proximity; the attackers must be within a few hundred feet to miles of the targeted trains, depending on the radio equipment’s strength. The disruption prompted Poland’s national transportation agency to announce plans to transition to GSM cellular radios with encryption and authentication by 2025. However, until then, the current VHF system will continue to pose a risk to railway operations.

While the radio attack did not result in injuries or significant damage, it underscored the ease with which such disruptions can occur. Olejnik emphasized that these low-cost, straightforward tactics are particularly appealing to those seeking to target infrastructure and exploit its vulnerabilities. If indeed linked to Russia’s supporters, this operation would echo prior cyber and physical disruption, amplifying concerns over geopolitical tensions and the potential exploitation of unsecured systems.

EDITORIAL TEAM
EDITORIAL TEAM
TechGolly editorial team led by Al Mahmud Al Mamun. He worked as an Editor-in-Chief at a world-leading professional research Magazine. Rasel Hossain and Enamul Kabir are supporting as Managing Editor. Our team is intercorporate with technologists, researchers, and technology writers. We have substantial knowledge and background in Information Technology (IT), Artificial Intelligence (AI), and Embedded Technology.

Read More

We are highly passionate and dedicated to delivering our readers the latest information and insights into technology innovation and trends. Our mission is to help understand industry professionals and enthusiasts about the complexities of technology and the latest advancements.

Visits Count

Last month: 23565
This month: 11639 🟢Running

Company

Contact Us

Follow Us

TECHNOLOGY ARTICLES

SERVICES

COMPANY

CONTACT US

FOLLOW US