• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»New attack can unlock and start a Tesla Model Y in seconds, say researchers
Security

New attack can unlock and start a Tesla Model Y in seconds, say researchers

September 12, 2022No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
New attack can unlock and start a Tesla Model Y in seconds, say researchers
Share
Facebook Twitter LinkedIn Pinterest Email

Tesla prides itself on its cybersecurity protections, particularly the elaborate challenge system that protects its cars from conventional methods for attacking the remote unlock system. But now, one researcher has discovered a sophisticated relay attack that would allow someone with physical access to a Tesla Model Y to unlock and steal it in a matter of seconds.

The vulnerability — discovered by Josep Pi Rodriguez, principal security consultant for IOActive — involves what’s called an NFC relay attack and requires two thieves working in tandem. One thief needs to be near the car and the other near the car owner, who has an NFC keycard or mobile phone with a Tesla virtual key in their pocket or purse.

Near-field communication keycards allow Tesla owners to unlock their vehicles and start the engine by tapping the card against an NFC reader embedded in the driver’s side body of the car. Owners can also use a key fob or a virtual key on their mobile phone to unlock their car, but the car manual advises them to always carry the NFC keycard as a backup in case they lose the key fob or phone or their phone’s battery dies.

In Rodriguez’s scenario, attackers can steal a Tesla Model Y as long as they can position themselves within about two inches of the owner’s NFC card or mobile phone with a Tesla virtual key on it — for example, while in someone’s pocket or purse as they walk down the street, stand in line at Starbucks, or sit at a restaurant.

The first hacker uses a Proxmark RDV4.0 device to initiate communication with the NFC reader in the driver’s side door pillar. The car responds by transmitting a challenge that the owner’s NFC card is meant to answer. But in the hack scenario, the Proxmark device transmits the challenge via Wi-Fi or Bluetooth to the mobile phone held by the accomplice, who places it near the owner’s pocket or purse to communicate with the keycard. The keycard’s response is then transmitted back to the Proxmark device, which transmits it to the car, authenticating the thief to the car by unlocking the vehicle.

See also  Gamescom Opening Night Live 2022 promises 30+ games, here's the start time and where to watch

Although the attack via Wi-Fi and Bluetooth limits the distance the two accomplices can be from one another, Rodriguez says it’s possible to pull off the attack via Bluetooth from several feet away from each other or even farther away with Wi-Fi, using a Raspberry Pi to relay the signals. He believes it may also be possible to conduct the attack over the internet, allowing even greater distance between the two accomplices.

once the thieves shut off the engine, they won’t be able to restart the car

If it takes time for the second accomplice to get near the owner, the car will keep sending a challenge until it gets a response. Or the Proxmark can send a message to the car saying it needs more time to produce the challenge response.

Until last year, drivers who used the NFC card to unlock their Tesla had to place the NFC card on the console between the front seats in order to shift it into gear and drive. But a software update last year eliminated that additional step. Now, drivers can operate the car just by stepping on the brake pedal within two minutes after unlocking the car.

The attack Rodriguez devised can be prevented if car owners enable the PIN-to-drive function in their Tesla vehicle, requiring them to enter a PIN before they can operate the car. But Rodriguez expects that many owners don’t enable this feature and may not even be aware it exists. And even with this enabled, thieves could still unlock the car to steal valuables.

See also  How crypto scams work – and why enterprises need to take note

There is one hitch to the operation: once the thieves shut off the engine, they won’t be able to restart the car with that original NFC keycard. Rodriguez says they can add a new NFC keycard to the vehicle that would allow them to operate the car at will. But this requires a second relay attack to add the new key, which means that, once the first accomplice is inside the car after the first relay attack, the second accomplice needs to get near the owner’s NFC keycard again to repeat the relay attack, which would allow the first accomplice to authenticate themself to the vehicle and add a new keycard.

If the attackers aren’t interested in continuing to drive the vehicle, they could also just strip the car for parts, as has occurred in Europe. Rodriguez says that eliminating the relay problem he found wouldn’t be a simple task for Tesla.

“To fix this issue is really hard without changing the hardware of the car — in this case the NFC reader and software that’s in the vehicle,” he says.

But he says the company could implement some changes to mitigate it — such as reducing the amount of time the NFC card can take to respond to the NFC reader in the car.

“The communication between the first attacker and the second attacker takes only two seconds [right now], but that’s a lot of time,” he notes. “If you have only half a second or less to do this, then it would be really hard.”

See also  Yakuza 0, Kiwami, and Kiwami 2 are back on Game Pass, and there's never been a better time to start the series

Rodriguez, however, says the company downplayed the problem to him when he contacted them, indicating that the PIN-to-drive function would mitigate it. This requires a driver to type a four-digit PIN into the car’s touchscreen in order to operate the vehicle. It’s not clear if a thief could simply try to guess the PIN. Tesla’s user manual doesn’t indicate if the car will lock out a driver after a certain number of failed PINs.

Tesla did not respond to a request for comment from The Verge.

It’s not the first time that researchers have found ways to unlock and steal Tesla vehicles. Earlier this year, another researcher found a way to start a car with an unauthorized virtual key, but the attack requires the attacker to be in the vicinity while an owner unlocks the car. Other researchers showed an attack against Tesla vehicles involving a key fob relay attack that intercepts and then replays the communication between an owner’s key fob and vehicle.

Rodriguez says that, despite vulnerabilities discovered with Tesla vehicles, he thinks the company has a better track record on security than other vehicles.

“Tesla takes security seriously, but because their cars are much more technological than other manufacturers, this makes their attack surface bigger and opens windows for attackers to find vulnerabilities,” he notes. “That being said, to me, Tesla vehicles have a good security level compared to other manufacturers that are even are less technological.”

He adds that the NFC relay attack is also possible in vehicles made by other manufacturers, but “those vehicles have no PIN-to-drive mitigation.”

Source link

Attack model researchers seconds start Tesla Unlock
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Comparing the Galaxy A55 and the Galaxy A35, I didn’t expect to choose this model

April 10, 2024

5 ChatGPT Prompts To Start A Side Hustle

August 12, 2023

Master These 8 ChatGPT Prompting Techniques To Unlock Its Full Potential

July 24, 2023
Add A Comment

Comments are closed.

Editors Picks

How this Seattle startup founder bounced back when her investors bailed out – Startup

September 22, 2022

Hunter Biden phone hack claims test platforms’ misinformation policies

July 12, 2022

Nine Tips For Successful Social Media Marketing As A Solopreneur

October 15, 2022

How a spoofed email passed the SPF check and landed in my inbox

September 8, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.