The tech used here is the popular Flipper Zero, an ethical hacker’s swiss army knife, capable of all sorts of things such as WiFi attacks or emulating NFC tags. Now, 404 Media has found an underground trade where much shadier hackers sell extra software and patches for the Flipper Zero to unlock all manner of cars, including models popular in the U.S. The hackers say the tool can be used against Ford, Audi, Volkswagen, Subaru, Hyundai, Kia, and several other brands, including sometimes dozens of specific vehicle models, with no easy fix from car manufacturers.

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    145
    arrow-down
    1
    ·
    2 days ago

    If you can hack a car with a flipper zero, then the car manufacturers failed to implement the most basic security protocols. Complain to them, and demand a fix.

    • bridgeenjoyer@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      18 hours ago

      Give us fucking keys and BUTTONS. We dont want or need this tech shit they want to shove into everything so they can show cancerous growth to ther shareholders.

    • innermachine@lemmy.world
      link
      fedilink
      English
      arrow-up
      14
      ·
      1 day ago

      Trouble is the move to complete computerization. Back in the day we had physical keys which turned a physical switch to physically connect the power from battery to wake ECU. Now, we have a button that sends a REQUEST to the ECU to turn on or off, and as long as an acceptable transponder is around it will accept the request. If you turn your car off when u hit that stop button it REQUESTS that the ECU shut down assuming conditions are met. I have had a problem 202w wrangler JL turn on fine but refuse to shut off untill you pulled the terminals off the battery. This new age hyper computerized nonsense is why every mechanic hates these new age techno bullshit wanna-be computer appliances on wheels, canbus can be awesome for keeping all modules on the same page but one bad wire and the whole system takes a shit.

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        ·
        1 day ago

        202w wrangler

        Well, Jeep is not really a name for good innovation. They are stuck with a management that still thinks “mechanics” and sees electronics as a pure profit center, not as a gear in the system that has to be as reliable as the rest of it.

        • innermachine@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 hours ago

          Yea I have not been impressed with the Stellantis products of late lol. If I want to own a complicated headache I’ll just buy a bmw or Audi lol (of which I have had both and both have been more dependable and straight forward than these new Chrysler products…)

    • YiddishMcSquidish@lemmy.today
      link
      fedilink
      English
      arrow-up
      28
      ·
      2 days ago

      Fucking real! My car (2016 Toyota Avalon) uses a rolling code for the transponder! It’s like one of the most basic things any manufacturer can do to avoid this shit! And it can’t be more than a few dozen lines of code (I’m no expert so this may be an exaggeration)?

      • ArcaneSlime@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        10
        ·
        1 day ago

        Of course, this particular attack actually “works” with rolling codes (WILL desync your real keyfob), it requires the attacker to sniff one signal off your key (incl lock) and then they can spoof your key’s rollover protocol (and any button, not just the one they sniffed) to reset the rolling code back to 0 and allowing them access. Iirc it’s different from a standard replay attack in (definitely) that it can spoof other keys on the fob it hasn’t read, and (I think) that while a trad replay attack requires the car not to hear the signal when recording I believe that doesn’t matter with this attack.

        Unfortunately I haven’t been able to test it out since I’m not buying a serial locked flipper firmware from some guy who just got out of prison selling it on telegram.

        • YiddishMcSquidish@lemmy.today
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 day ago

          What if I only use the fob as a fob? I usually only use the touch pad to lock and inner handle’s proximity sensor to unlock, so the car is only range finding after initial sense.

          • ArcaneSlime@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 day ago

            If you literally never press the buttons, nor leave your keys alone with anyone else who could possibly push the buttons?

            Then a guy with a $20 car unlock kit from Autozone can still get in. And so can a guy with a hammer, and a guy with a broken spark plug. Locks are suggestions, especially when you have windows.

            And that’s not even to mention people with actual SDRs that can repeat your key’s signal and remote start your car, keep your fob in a faraday bag.

            • YiddishMcSquidish@lemmy.today
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 day ago

              I totally got you in the weakness order of operation. I used to be a locksmith in a previous life in South Florida. Used to tell people they needed double sided deadbolt cause there’s a piece of glass next to it, and that they could also just climb through the window so if they were really worried they would want to put up bars or invisible hard screen. Also I am THE most techy person in my friend group and the most I’ve done is put together a tiny esp32 marauder with an old Bitcoin lottery miner, and even then my keys stay in my pocket. Plus it’s an almost ten year old car with 100k+ miles with a few dents and scratches. So I wouldn’t expect such a sophisticated stack especially considering the town I live in is only like ~50k pop.

              • ArcaneSlime@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                2
                ·
                19 hours ago

                locksmith

                OH you know what’s up for sure then lmao.

                Yeah tbh there’s nothing a flipper can do that you can’t do with a better tool, it just rolls a bunch of stuff into a digital swiss army knife of sorts. It’s not something a real car thief would use, maybe someone would use it to break into your car and steal something but a car thief would have something purpose built, or just go low tech if they can. You can run marauder on it too with the wifi board though lol.

                • YiddishMcSquidish@lemmy.today
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  19 hours ago

                  Really‽ I couldn’t seem to find any signal when I was sniffing for one at home. Could you point me in the direction of some good documentation? Cause I can’t find nothing but YouTube videos of guys driving around saying “omg ,I pinged them and have all their network info!!1!”

                  • ArcaneSlime@lemmy.dbzer0.com
                    link
                    fedilink
                    English
                    arrow-up
                    2
                    ·
                    17 hours ago

                    Tbh I haven’t messed too much with it, but there was videos on youtube and in a few repos on github that helped me play around a little. Maybe try justcallmekoko’s repo I think?

      • Doomsider@lemmy.world
        link
        fedilink
        English
        arrow-up
        21
        arrow-down
        1
        ·
        1 day ago

        It is almost like their should be something written down somewhere. Like a guideline or rule or something…

        Oh that is right, it is called a regulation requiring basic wireless security for extremely expensive consumer items.

    • douglasg14b@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 day ago

      TBF most of these are failures and exploits on older devices.

      Which are a dime a dozen across the entire industry. Security is rather difficult, especially when considering exploits and bugs.

      Ofc many of these ARE the results of cut corners, though many are just a lack of security awareness or old devices with known exploits discovered long after manufacturing.

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 day ago

        The lack of security awareness is due to them to scrooge to hire the right professionals for the job. It is 100% the result of cutting corners.

        • Jason2357@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          39 minutes ago

          When a car is stolen, they typically get to sell another one, courtesy of the drivers insurance policy. They are incentivized to bad security.