23‑Year‑Old Hacks Taiwan High‑Speed Rail with SDR: TETRA Flaw Exposes 19‑Year Gap

A 23‑year‑old Taiwanese student used a low‑cost SDR and eleven handheld radios to clone unchanged TETRA parameters, trigger a General Alarm, and force four high‑speed trains to stop, exposing a 19‑year‑old key‑rotation flaw and highlighting broader risks in critical‑infrastructure radio security.

Black & White Path
Black & White Path
Black & White Path
23‑Year‑Old Hacks Taiwan High‑Speed Rail with SDR: TETRA Flaw Exposes 19‑Year Gap

1. Incident Overview

On 5 April 2026 at 23:23, the Taiwan High Speed Rail Corporation (THSRC) dispatch centre received a General Alarm (GA) from a handheld radio belonging to the maintenance department. GA is the highest‑priority TETRA alarm and automatically switches all trains in the area to manual emergency brake, causing four operating trains to stop on the tracks.

SDR equipment and high‑speed rail TETRA intrusion diagram
SDR equipment and high‑speed rail TETRA intrusion diagram

2. Attack Methodology

The police reconstruction identified five steps:

Acquire equipment : The suspect purchased a software‑defined radio (SDR) and connected it to an antenna and a laptop.

Capture traffic : Using open‑source software, he recorded THSRC’s TETRA communication stream.

Decode parameters : He extracted the over‑the‑air (OTA) parameters, including encryption keys and configuration, exposing the entire TETRA air‑interface setup.

Program radios : The extracted parameters were written to eleven handheld radios.

Trigger alarm : From a location within signal coverage, he transmitted a GA signal, causing the four trains to halt.

A 21‑year‑old associate reportedly supplied some of the THSRC parameters. The most difficult step was acquiring the SDR; the remaining steps were covered by open‑source tools.

3. About TETRA

Purpose and Design

TETRA (Terrestrial Trunked Radio) is a digital trunked radio standard designed for public‑safety, railway, airport and port infrastructures. It aims for reliability, priority handling and disaster tolerance, which is why GA signals must be acted upon by all devices in the coverage area.

Known Weakness

Early versions of TETRA use the TEA1 encryption algorithm, which was disclosed to contain a backdoor (CVE‑2022‑24402). The backdoor enables full decryption of traffic and injection of forged control commands. An SDR together with the open‑source Osmocom TETRA decoder can exploit this weakness.

TETRA Radio System
TETRA Radio System

4. Stale Parameters

THSRC’s TETRA system is said to have seven layers of verification, but all layers rely on the same set of keys and IDs that have not been rotated since 2019. This illustrates a common flaw in critical‑infrastructure security: designs remain on paper while the operational environment never updates, rotates, or tests its cryptographic material.

5. Investigation and Attribution

Base‑station logs record the uplink source, allowing triangulation of the transmitter. Combined with CCTV footage, investigators located the suspect’s rental apartment, where they seized eleven handheld radios, a laptop and the SDR. The suspect posted a NT$100,000 bail and faces up to ten years in prison under Taiwan’s Railway Act and Criminal Code.

6. Similar Incidents

2016, Slovenia: Student Dejan Ornig used RTL‑SDR and Osmocom TETRA to discover that police TETRA terminals lacked authentication. After reporting the issue, he was prosecuted and eventually received a seven‑month suspended sentence.

Early 2026, United States: Security researchers demonstrated that an SDR could replicate unauthorized brake commands for freight‑train “end‑of‑train” devices, showing a comparable RF attack surface.

Both cases show that security research is often treated as criminal activity rather than an opportunity for improvement.

7. Lessons for Critical Infrastructure

Radio parameters must be rotated on a regular schedule; using a single set of keys for nineteen years is unacceptable.

Physical security alone is insufficient; logical controls such as anomaly detection at the base‑station level are essential.

SDR devices have lowered the barrier to entry for radio attacks, creating a severe asymmetry between attackers and defenders.

Operators should value security researchers and establish responsible‑disclosure processes, otherwise vulnerabilities remain hidden.

8. References

Taipei Times article (2026‑05‑05)

RTL‑SDR coverage of the incident

CVE‑2022‑24402 disclosure

Dejan Ornig case report

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

critical infrastructureSDRCVE-2022-24402radio vulnerabilityrailway securityTETRA
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.