Hacking Traffic Signals Has Never Been So Easy


Written by: Anon.Dos


Hacking Internet of Things (IoTs) has turned into a stunning practice for digital offenders out there, but messing with Traffic lights would be something more exciting for them.

The hacking scenes in Hollywood films has recently been a wellspring of stimulation for the IT industry, in the same way as we’ve seen traffic lights hacked in Die Hard and The Italian Job, however these motion pictures dependably motivate programmers to perform comparable hacking assaults in everyday life.

Security scientists at the University of Michigan have not just hacked traffic light signs in real life, additionally asserted that it’s really shockingly simple to perform by anybody with a laptop and the right sort of radio. On the off chance that we analyse the traffic light hacks in films and real life , in reality it’s much simpler.

In a paper study, the security researchers tell us how an arrangement of real security vulnerabilities in traffic light frameworks permitted them to effortlessly and immediately seized control of the entire system of no less than 100 traffic signals in Michigan city from a solitary point of access.

Specialists took permission from the road agency before performing the test, yet they didn’t reveal precisely where in Michigan they did they performed these exciting tests.




The group, headed by University of Michigan computer scientist J. Alex Halderman, said that the network traffic frameworks are left helpless against three real vulnerabilities:

  • Decoded radio signs.
  • Utilization of factory set usernames and passwords.
  • A debugging port that is not difficult to attack.

So these things leave the network accessible to everyone from professional hackers to script kitties.

To save money on installation expenses and expand flexibility, the traffic light system makes utilization of remote radio signs instead of committed physical systems network links for its correspondence base – this gap was abused by the analysts. Shockingly, more than 40 states at present utilize such systems to keep traffic running as proficiently as they can.




The Traffic light use a combination of 5.8 GHz and 900 MHz radio signals, contingent upon the conditions at every intersection, for wireless correspondence in point-to-point or point-to-multipoint designs. The 900 MHz connections utilize “an exclusive convention with recurrence bouncing spread-spectrum (FHSS),” yet the 5.8 GHz version of the proprietary protocol is not quite the same as 802.11n.

Researchers says that anybody with a laptop and a wireless card working on the same frequency as the wireless network traffic light — for this situation, 5.8 gigahertz — could get to the whole decoded system of networks.



Presently, after getting access, next was to correspond with one of the controllers in their target system. This was carried out effectively because of the fact that the control boxes run VxWorks 5.5, a version which naturally gets built from source with a debug port left open for testing.

This debug port permitted scientists to effectively turn all lights red or adjust the timing of neighbouring crossing points — for instance, to verify somebody hit all green lights on a given course.

Additional, the capacity of a digital criminal to perform denial-of-service (DoS) attack on controlled intersections by setting off each intersection’s glitch management unit by attempting invalid setups, which would put the lights into a failure mode.



Finally, the group called for manufactures and operators of the traffic signals to enhance the security of traffic signals network. It proposed that the traffic system’s administrators ought not to utilize default usernames and passwords, and they should stop broadcasting frequencies unprotected for onlookers and curious people.

Besides, they additionally warned that gadgets like voting machines and even connected automobile could endure similar attacks.






Get Your Anonymous T-Shirt / Sweatshirt / Hoodie / Tanktop, Smartphone or Tablet Cover or Mug In Our Spreadshirt Shop! Click Here



  1. In the app itself it says it’s fake and for entertainment purposes only. Wether that’s just a protection disclaimer or not, I doubt it works.

    But hey I’m willing to give it a try… since it’s free

  2. If you read the article instead of looking at the pictures like a pop up book you would realize that there is in fact no application to change stop lights you dumb fucks.

  3. People are dumb… First the mask can be bought just about any online retail store. Second the mask isn’t anonymous’s, the mask has been around for awhile before anonymous… Also anonymous is a cyber organization that specializes in online security attacks… So unless you are a very proficient hacker you can wear the mask all day but it still won’t make you a “member”… You just become a member of society wearing a mask for a cause… And lastly in order to get this” app” you would need some form of computer language knowledge and radio knowledge, then you would have to design it yourself… And don’t think about marketing the app because that’s a form of cyber terrorism and is a federal offense… Happy programming 🙂

    • @MasterRoshi You are precisely correct on that part and you picked the correct name to speak such words of wisdom lol people are stupid and do not realize that if you randomly ask questions all over the interwebs you are in no way a real hacker lawl

  4. There is no app but there is the idea; it could be made. It wouldn’t be on google play store, because it isn’t leagal. If u want the public to go crazy, make it and post it.

  5. Nice comment Master Roshi 🙂
    Anonymous we r all,each one in diferent ways..
    Who deals with internet ..well how do i say,it s like riding a bike you know…after learn you never more forget ^^
    Dont make a big deal about masks or how to change the signals..are much importante things to discuss and to decide..
    Namastê to all

  6. Anonymous , could you give me some tips for anti-virus cause I think my computer have virus , thx if you guys could help <3 love you guys and your work , keep on the fantastic work guys !!!

    • i personally use Comodo and from what i researched that is the best free anti-virus and mind you that’s my personal opinion people have different opinions we are Anonymous We do not forgive We do not Forget expect us

  7. I have a question regarding the checkmate on this site. Now I want to look up myself to ensure that I’m not mistaken by another identity. But by doing so I’m releasing my anonymity. So is it truly safe do use this site and is there anyone that could be watching to find out exactly who I am. Just wondering and it’s not a big deal, I don’t have to use it. Thank you anon

  8. This is pathetic. Here I expect to see people actually talking about the thread. But instead you are all proving that you can’t even handle a comment section.

    Who even remembers the topic.

  9. I already know that for now there is no app to run any hack of any type close to this source. However, if you wish to get an app like this… why not make one yourself instead of wasting your time trying to get one as shown in this site or any other regardless of even showing a little bit more than what these sites give. TIPS: you can either wait till someone invents one for us brothers and sisters(Hackers), hope someone will find one that actually works, or you can try to make one yourself the way you like it and publish it to the rest of this community. Thank you for the time to read this and I hope you never forget this message.


Please enter your comment!
Please enter your name here