Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech
In an age where cars are becoming smarter and more secure, it may come as a surprise that even the most advanced vehicles, like Teslas, are not immune to theft. Despite the introduction of new keyless technology, it seems that these electric vehicles can still be stolen with a sophisticated, yet inexpensive radio hack.
Earlier this year, researchers from the Computer Security and Industrial Cryptography (COSIC) group at the KU Leuven University in Belgium released a paper revealing their findings about the vulnerability of keyless entry systems in Tesla Model S vehicles. The researchers discovered that, by using relatively cheap and easily accessible equipment, they were able to perform a radio hack and gain entry into these supposedly secure vehicles.
Keyless technology, designed to make accessing and starting a car more convenient, has become increasingly popular over the past decade. Instead of using a traditional key, drivers can simply keep a fob or keycard in their pocket or bag, and the car’s sensors automatically detect its presence. However, this convenience can come at a price, as researchers have found that criminals can exploit the radio frequency (RF) signals emitted by keyless systems to bypass security measures.
The radio hack involves amplifying the signal from the victim’s key fob, effectively increasing its range. This allows thieves to intercept the signal from inside the owner’s home, even when the key fob is stored securely and out of sight. By using inexpensive RF equipment, criminals can then relay this amplified signal to a second device situated near the victim’s vehicle, effectively tricking the car into thinking that the legitimate key fob is nearby. The thieves can then gain access to the car and start the engine, all without causing any damage or leaving any trace.
This vulnerability affects not only Teslas but other vehicles with keyless entry systems as well. In fact, these types of attacks have been witnessed on a wide range of car models, and Tesla is no exception. However, given the high-profile nature of the brand and its reputation for cutting-edge technology, the discovery of this flaw has raised concerns among Tesla owners and enthusiasts.
The researchers at KU Leuven have suggested several countermeasures that vehicle manufacturers, including Tesla, can adopt to protect against this type of attack. These measures include reducing the range of the keyless entry system, implementing motion sensors to ensure the key fob is in close proximity to the vehicle when it is in use, and using cryptographic protocols to secure the communication between the key fob and the car.
Tesla has acknowledged the findings of the researchers and has already made improvements to address this vulnerability. The company has issued over-the-air software updates to its vehicles, which limit the key fob’s communication range and require drivers to enter a PIN code on the central touchscreen to start the car. These additional security measures aim to enhance the overall protection of Tesla vehicles and mitigate the risk of theft through radio hacks.
While Tesla has taken steps to improve the security of its vehicles, it is worth noting that this radio hack is not unique to the company. Other car manufacturers need to address this issue as well and enhance the security of their keyless entry systems. Consumers, on the other hand, should be aware of the risks associated with keyless technology and take additional measures to safeguard their vehicles.
In conclusion, the recent discovery of a radio hack capable of compromising the keyless entry systems of Tesla vehicles has shed light on the vulnerabilities that still exist in modern car security. Despite the implementation of new keyless technology, it is evident that further improvements are needed to protect against sophisticated attacks. As the automotive industry continues to innovate, it becomes crucial for manufacturers to stay one step ahead of the criminals and safeguard the assets and privacy of their customers.