Fun with Trains: Hacking Railway Signaling Systems
This talk demonstrates a hardware-based attack technique to manipulate railway signaling systems by emulating track-side beacons using simple inductive coupling. The researchers show how to construct a low-cost, passive device using a coil and capacitor to induce specific frequencies that trigger false signal aspects in the train's onboard equipment. This vulnerability highlights the lack of authentication and encryption in legacy railway signaling protocols like ASFA, allowing for potential safety-critical interference. The presentation includes a practical demonstration of the attack using a custom-built, low-cost hardware tool.
How Inductive Coupling Can Bypass Legacy Railway Signaling
TLDR: Researchers at DEF CON 2024 demonstrated that legacy railway signaling systems like ASFA are vulnerable to signal spoofing via simple, low-cost inductive coupling. By constructing a passive device with a coil and capacitor, an attacker can induce specific frequencies that trick a train’s onboard equipment into reading false signal aspects. This research highlights the critical need for authentication and encryption in industrial control systems that currently rely on "security through obscurity."
Railway signaling is often treated as a black box by security researchers, but the reality is far more fragile than the safety-critical nature of the industry suggests. At DEF CON 2024, researchers David Meléndez Cano and Gabriela García pulled back the curtain on the ASFA (Anuncio de Señales y Frenado Automático) system, a legacy signaling protocol still widely deployed across the Spanish rail network. Their research proves that you do not need sophisticated radio jamming or network access to manipulate train movements. You just need a basic understanding of physics and a few dollars worth of hardware.
The Mechanics of the Attack
The ASFA system relies on track-side beacons to communicate signal aspects to the train. These beacons are passive devices installed between the rails. When a train passes over a beacon, the onboard equipment induces a current in the beacon’s coil, which then modulates the signal back to the train. The frequency of this signal tells the train whether to proceed, slow down, or stop.
The vulnerability here is a total lack of authentication or encryption. The train’s onboard computer simply measures the frequency it receives and maps it to a predefined signal aspect. Because the system is entirely passive and relies on inductive coupling, it is susceptible to any device that can generate a similar magnetic field at the correct frequency.
The researchers demonstrated that an attacker can emulate these beacons using a simple circuit consisting of a coil and a capacitor. By tuning the circuit to the specific resonant frequency of a target signal, the attacker can induce the train’s onboard sensor to "read" a signal that does not exist. During their presentation, they showed a proof-of-concept device built inside a food tin, proving that the barrier to entry for this type of interference is remarkably low.
Technical Deep Dive: Inductive Coupling
To understand why this works, you have to look at the impedance and resonance of the circuit. The beacon acts as an LC circuit. When the train passes over it, the magnetic field from the train’s antenna couples with the beacon’s coil.
The researchers used a NanoVNA to analyze the frequency response of their spoofing device. By adjusting the capacitance in their circuit, they could shift the resonant frequency to match the specific values used by the ASFA system. The key technical takeaway is that the system does not verify the identity of the beacon. It only cares about the frequency response. If you can replicate the frequency, you can replicate the signal.
For a pentester, this changes the threat model for industrial control systems. You are not looking for a buffer overflow in a web interface; you are looking for physical access to the track and the ability to manipulate the environment. If you are performing a red team engagement on a rail facility, your focus should shift to the physical layer. Can you place a device near the tracks? Can you influence the magnetic field near the train’s sensors?
Real-World Applicability and Risk
While the researchers focused on the ASFA system, the underlying principle applies to any signaling system that uses unauthenticated inductive or magnetic coupling. Systems like PZB/Indusi used in Germany and other parts of Europe operate on similar principles.
The impact of a successful spoofing attack is significant. By inducing a "stop" signal, an attacker could cause massive transit delays. By inducing a "proceed" signal in a section of track that should be restricted, the potential for a collision increases. This is not just a theoretical risk; the researchers pointed to historical accidents in Spain where misinterpretation of signals led to loss of life.
The Path to Hardening
Defending against this requires a fundamental shift in how these systems are designed. The current reliance on proprietary, legacy protocols is a liability. The industry must move toward authenticated, encrypted communication between track-side equipment and the train.
If you are working with critical infrastructure, the first step is to perform a thorough audit of the signaling hardware. Identify where legacy, unauthenticated systems are still in use and prioritize them for replacement with modern standards like ETCS (European Train Control System). For those currently operating these systems, physical security and surveillance of the track-side environment are the only immediate mitigations.
Security researchers should continue to push for transparency in these protocols. The "security through obscurity" model has failed, and the only way to ensure the safety of these systems is to subject them to the same rigorous testing as any other piece of critical software. If you have the opportunity to research these systems, do it. The safety of the public depends on finding these flaws before someone with malicious intent does.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
Up Next From This Conference

Breaking Secure Web Gateways for Fun and Profit

Listen to the Whispers: Web Timing Attacks That Actually Work

Abusing Windows Hello Without a Severed Hand
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Anyone Can Hack IoT: A Beginner's Guide to Hacking Your First IoT Device

