Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

On April 5, 2026, a 23-year-old student with consumer-grade radio hardware halted four Taiwan High-Speed Rail trains for 48 minutes by spoofing a TETRA emergency beacon, triggering automatic braking across the network. The attack succeeded because THSR never rotated its TETRA radio parameters across 19 years of operation, a credential management failure that allowed a low-sophistication actor to bypass seven verification layers with off-the-shelf equipment. This incident demonstrates that legacy OT/ICS communication protocols operating on static credentials are viable targets for physical-consequence attacks, and that operational rail and critical infrastructure networks face realistic disruption threats from actors well below nation-state capability.

Author

Tech Jacks Solutions