Hackers can clone millions of Toyota, Hyundai, and Kia keys

Encryption flaws in common anti-theft feature expose vehicles from major OEMs. …

The all-new Toyota Camry. It's lower and wider and sleeker than before, and we think that from this angle it succeeded in making it look quite sporty.

Enlarge / The all-new Toyota Camry. It’s lower and wider and sleeker than before, and we think that from this angle it succeeded in making it look quite sporty.
Jonathan Gitlin

reader comments

67 with 51 posters participating

Over the past few years, owners of cars with keyless start systems have learned to worry about so-called relay attacks, in which hackers exploit radio-enabled keys to steal vehicles without leaving a trace. Now it turns out that many millions of other cars that use chip-enabled mechanical keys are also vulnerable to high-tech theft. A few cryptographic flaws combined with a little old-fashioned hot-wiring—or even a well-placed screwdriver—lets hackers clone those keys and drive away in seconds.

Researchers from KU Leuven in Belgium and the University of Birmingham in the UK earlier this week revealed new vulnerabilities they found in the encryption systems used by immobilizers, the radio-enabled devices inside of cars that communicate at close range with a key fob to unlock the car’s ignition and allow it to start. Specifically, they found problems in how Toyota, Hyundai, and Kia implement a Texas Instruments encryption system called DST80. A hacker who swipes a relatively inexpensive Proxmark RFID reader/transmitter device near the key fob of any car with DST80 inside can gain enough information to derive its secret cryptographic value. That, in turn, would allow the attacker to use the same Proxmark device to impersonate the key inside the car, disabling the immobilizer and letting

Continue reading – Article source

Similar Posts: