Share this
New Hacking Techniques Targeting Car Keys
by Reflare Research Team on May 14, 2021 7:22:00 PM
It has been proven that hackers can communicate with the encrypted logic of a car's key fob to force it to unlock vehicles. What's more, these keys can be cloned and duplicated using off-the-shelf equipment, allowing anyone to open and drive a vehicle without the keys or validating authentication factors, which poses an entirely new application for radio-based attacks against remote locking systems.
First Published 27th April 2017 | Latest Refresh 14th May 2021
Key duplication - cheaper than an Uber.
3 min read | Reflare Research Team
Attack Overview
We have previously written about the ongoing trend of car access systems being hacked and cars subsequently stolen. While most of these attacks rely on either repeating a fixed radio signal or reverse engineering cryptographic secrets stored in the keys, a Chinese security research team known as UnicornTeam demonstrated a novel approach to car hacking at HITB Amsterdam.
The attack specifically targets newer cars with the functionality to automatically unlock the car and engine if the owner of the vehicle is nearby. According to the researchers, such cars will send a radio signal when the door handle is operated. If the car key receives the signal it will answer with a cryptographically generated message. If the car receives the message from the key, it unlocks the door.
The radio signal is relatively weak, meaning that the car and key have to be in close proximity for the unlocking to succeed. Once the owner walks away from the car, the doors can no longer be unlocked, and the motor won’t engage as the key is out of range.
The researchers used relatively inexpensive hardware to relay the radio signal over several hundred meters. To do so, they used two sets of antennas connected to laptops. One unit is positioned next to the car, and the other one is in close proximity to the owner. When the door handle is used, the signal sent by the car is received by the first unit and then sent to the second unit over Wi-Fi or mobile data networks. The second unit then replays the request in close proximity to the key.
The key has no understanding of the car’s actual location and thus processes the replayed signal as it would the original one. Once the key sends the cryptographically generated answer, it too is captured (this time by the second unit), transmitted back to the first unit and replayed there.
Since the car receives the correct response message, it unlocks the door.
Scenarios
It is important to understand that this attack does not crack the secret information stored on the key in any way. Rather, it uses the real key to unlock the car while it is hundreds of meters away.
The car expects a response to its initial signal within a few hundred milliseconds, so the attack is limited to distances where the data can be transmitted over a network in the required time.
What is in the car will often be a more attractive target than the car itself.
Nonetheless, the attack has great potential, especially when used against high-value targets such as politicians, military leadership or executives. In all cases, the contents of the car would be more interesting to attackers than the car itself. Once access to the interior of a car is gained, the car’s computer system may also be more easily infected with malware for use in further attacks.
Summary
While this novel attack will be of relatively little concern to the average consumer (attacks against cryptographically weak older car key systems pose a much bigger threat here), it perfectly illustrates the challenges companies face when trying to secure any sort of hardware against cyber-attacks: While the core authentication mechanism may be well thought through and secure, attackers routinely find holes in the mechanism’s logic itself which allows them to bypass the mechanism altogether.
However, this vulnerability is not the only exploit you need to address. Learn how to mitigate risks of specific attacks before you find yourself having to react post-breach by checking out our research reports on other similar topics.
Share this
- November 2024 (1)
- October 2024 (1)
- September 2024 (1)
- August 2024 (1)
- July 2024 (1)
- June 2024 (1)
- April 2024 (2)
- February 2024 (1)
- January 2024 (1)
- December 2023 (1)
- November 2023 (1)
- October 2023 (1)
- September 2023 (1)
- August 2023 (1)
- July 2023 (1)
- June 2023 (2)
- May 2023 (2)
- April 2023 (3)
- March 2023 (4)
- February 2023 (3)
- January 2023 (5)
- December 2022 (1)
- November 2022 (2)
- October 2022 (1)
- September 2022 (11)
- August 2022 (5)
- July 2022 (1)
- May 2022 (3)
- April 2022 (1)
- February 2022 (4)
- January 2022 (3)
- December 2021 (2)
- November 2021 (3)
- October 2021 (2)
- September 2021 (1)
- August 2021 (1)
- June 2021 (1)
- May 2021 (14)
- February 2021 (1)
- October 2020 (1)
- September 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (2)
- March 2020 (1)
- February 2020 (1)
- January 2020 (3)
- December 2019 (1)
- November 2019 (2)
- October 2019 (3)
- September 2019 (5)
- August 2019 (2)
- July 2019 (3)
- June 2019 (3)
- May 2019 (2)
- April 2019 (3)
- March 2019 (2)
- February 2019 (3)
- January 2019 (1)
- December 2018 (3)
- November 2018 (5)
- October 2018 (4)
- September 2018 (3)
- August 2018 (3)
- July 2018 (4)
- June 2018 (4)
- May 2018 (2)
- April 2018 (4)
- March 2018 (5)
- February 2018 (3)
- January 2018 (3)
- December 2017 (2)
- November 2017 (4)
- October 2017 (3)
- September 2017 (5)
- August 2017 (3)
- July 2017 (3)
- June 2017 (4)
- May 2017 (4)
- April 2017 (2)
- March 2017 (4)
- February 2017 (2)
- January 2017 (1)
- December 2016 (1)
- November 2016 (4)
- October 2016 (2)
- September 2016 (4)
- August 2016 (5)
- July 2016 (3)
- June 2016 (5)
- May 2016 (3)
- April 2016 (4)
- March 2016 (5)
- February 2016 (4)