{"id":19073,"date":"2022-05-17T13:10:08","date_gmt":"2022-05-17T21:10:08","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/05\/17\/news-12806\/"},"modified":"2022-05-17T13:10:08","modified_gmt":"2022-05-17T21:10:08","slug":"news-12806","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/17\/news-12806\/","title":{"rendered":"Car owners warned of another theft-enabling relay attack"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 17 May 2022 20:16:22 +0000<\/strong><\/p>\n<p>Tesla owners are no strangers to seeing reports of cars being tampered with outside of their control. Back in 2021, a zero-click exploit aided a drone in <a href=\"https:\/\/www.securityweek.com\/tesla-car-hacked-remotely-drone-zero-click-exploit\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">taking over the car&#8217;s entertainment system<\/a>. In 2016, we had a <a href=\"https:\/\/thehackernews.com\/2016\/09\/hack-tesla-autopilot.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">brakes and doors<\/a> issue. 2020 saw people <a href=\"https:\/\/www.wired.com\/story\/tesla-model-x-hack-bluetooth\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">rewriting key-fob firmware<\/a> via Bluetooth. Andin January this year, a teen <a href=\"https:\/\/www.businessinsider.com\/teen-security-researcher-describes-how-he-hacked-into-25-teslas-2022-1?r=US&amp;IR=T\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">claimed<\/a> he had managed to remotely hack into 25 Tesla vehicles.<\/p>\n<p>This time, we have another <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bluetooth key-fob issue<\/a> making waves. Although there is a Tesla specific advisory, there are also advisories for this issue generally and a type of smart lock.<\/p>\n<h2>Bluetooth Low Energy and keyless entry systems<\/h2>\n<p>The researchers who discovered this issue are clear that it isn&#8217;t &#8220;just&#8221; a problem for Tesla. It&#8217;s more of a problem related to the Bluetooth Low Energy (BLE) protocol used by the keyless entry system. Bluetooth is a short-range wireless technology which uses radio frequencies and allows you to share data. You can connect one device to another, interact with <a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2020\/06\/bluetooth-beacons-one-free-privacy-debate-with-your-next-order\/\">Bluetooth beacons<\/a>, and much more. Bluetooth is a perfect fit for something as commonplace as keyless door entry.<\/p>\n<p>As the name suggests, <a href=\"https:\/\/www.bluetooth.com\/learn-about-bluetooth\/tech-overview\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BLE<\/a> is all about providing functionality through very low energy consumption. As BLE is only active for <a href=\"https:\/\/www.link-labs.com\/blog\/bluetooth-vs-bluetooth-low-energy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">very short periods of time<\/a>, it&#8217;s a much more efficient way to do things.<\/p>\n<h2>The relay attack in action<\/h2>\n<p>Researchers demonstrated how this compromise of the keyless system works in practice. Though light on details, Bloomberg mentions it is a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Relay_attack\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">relay attack<\/a>. This is a fairly common method used by people in the car research realm to try and pop locks.<\/p>\n<p>To help describe a relay attack, it&#8217;s common to first explain how a <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/man-in-the-middle-mitm\/#:~:text=In%20cybersecurity%2C%20a%20Man%2Din,parties%2C%20again%20without%20them%20realizing.\">Man in the Middle<\/a> (MitM) attack works:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p><em>In cybersecurity, a Man-in-the-Middle (MitM) attack happens when a threat actor manages to intercept and forward the traffic between two entities without either of them noticing. In addition, some MitM attacks alter the communication between parties, again without them realizing.<\/em><\/p>\n<\/blockquote>\n<p>For relay attacks, think of two people (or one person with two devices) sliding their way into the device-based communication. Some of the diagrams I&#8217;ve seen explaining this attack can be a little confusing, but this video explanation is perfect:<\/p>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper\"> <iframe loading=\"lazy\" class=\"youtube-player\" width=\"100%\" height=\"420\" src=\"https:\/\/www.youtube.com\/embed\/D_3lgxMwrWI?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;start=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\" frameborder=\"0\"><\/iframe> <\/div>\n<\/figure>\n<p>As you can see, two people approach the car. One pulls the handles to trigger the car&#8217;s security system into sending out a message. &#8220;Are you the owner of this car, are your keys the correct keys for this vehicle?&#8221; The authentication challenge is beamed out into the void. The second person is standing by the house with a device.<\/p>\n<p>People often leave their car keys close to the front door. As a result, the keys will be within range of the second person&#8217;s device. It takes the fob&#8217;s response and beams it back to the criminal by the car. The device in their hand relays the fob&#8217;s authentication confirmation to the car and the door unlocks. They then repeat this process a second time. This is to fool the car into thinking the keys are present, at which point they&#8217;re able to drive away.<\/p>\n<h2>A gear-shift in criminal perspective<\/h2>\n<p>Criminals are after maximum gain for minimum effort. They don&#8217;t want to attract attention from law enforcement. The sneakier they can be, the less commotion they cause, and the better it&#8217;s going to be for them in the long-term.<\/p>\n<p>Think about how seamless a relay approach is to car theft. It&#8217;s quick, it&#8217;s easy, and it&#8217;s completely silent. Consider how much money a professional outfit pulling these car heists can generate. The alternative is messy break-ins, noise, rummaging for keys in a house full of screaming people and barking dogs. Not to mention a significantly increased chance of being caught. If you were a career criminal, which approach would you favour?<\/p>\n<h2>A problem which refuses to go away<\/h2>\n<p>Relay attacks on cars have been around for several years now. Stolen vehicles are the go-to example of relay attacks if you go looking for <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/what-is-relay-attack\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">more information<\/a> on the technique. Advice for avoiding relay attacks is <a href=\"https:\/\/www.locksmiths.co.uk\/faq\/keyless-car-theft\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">widespread<\/a>, from keeping keys away from the front door (which <a href=\"https:\/\/www.warringtonguardian.co.uk\/news\/16970194.warning-opportunistic-thieves-use-hook-cane-device-steal-keys\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">you should do anyway<\/a>) to placing them in a signal-blocking bag.<\/p>\n<p>For the <a href=\"https:\/\/research.nccgroup.com\/2022\/05\/15\/technical-advisory-tesla-ble-phone-as-a-key-passive-entry-vulnerable-to-relay-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Tesla specific attack<\/a>, a relay device was placed &#8220;within roughly 15 yards&#8221; of the smartphone\/key-fob, with the other plugged into a laptop close to the vehicle. You can see more information about the more general forms of attack <a href=\"https:\/\/research.nccgroup.com\/2022\/05\/15\/technical-advisory-ble-proximity-authentication-vulnerable-to-relay-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n<p>The article mentions that there&#8217;s no evidence of this Tesla tomfoolery having happened in the wild. Even so, relay attacks <a href=\"https:\/\/www.bbc.co.uk\/news\/business-47023003\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">can and do take place<\/a>. If your car operates a keyless system, take this latest report as a heads-up to ensure your vehicle is safe from attack no matter the make or model.<\/p>\n<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/hacking-2\/2022\/05\/car-owners-warned-of-another-theft-enabling-relay-attack\/\">Car owners warned of another theft-enabling relay attack<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/hacking-2\/2022\/05\/car-owners-warned-of-another-theft-enabling-relay-attack\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 17 May 2022 20:16:22 +0000<\/strong><\/p>\n<p>We take a look at the latest report of relay attacks used to steal cars. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/hacking-2\/2022\/05\/car-owners-warned-of-another-theft-enabling-relay-attack\/\">Car owners warned of another theft-enabling relay attack<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11472,13238,15234,3919,26185,26186,26187,26188,13239,1596],"class_list":["post-19073","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bluetooth","tag-car","tag-hacked","tag-hacking","tag-key-fob","tag-keyless-entry","tag-relay-attack","tag-stolen","tag-tesla","tag-theft"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19073"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19073\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19073"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}