Skip to main content

Keyless entry: European researchers unlock cars with hacked radios

2016 Land Rover Range Rover Evoque
The downside of increased technology is increased vulnerability to hackers, and European researchers have just found another way to exploit that vulnerability. Researchers at ADAC (basically Germany’s equivalent to AAA) were able to unlock and start cars by tricking onboard systems into thinking a key fob was nearby.

Many cars today can be unlocked and even started so long as the key fob is nearby, but there may be a price to pay for that convenience. Vehicles from 19 manufacturers were vulnerable to something called the “amplifier attack,” which uses a simple radio amplifier to gain access to cars, reports The Telegraph.

However, the attack still requires some access to both the key fob and the car. A radio amplifier is placed near the fob, while a receiver is placed near the car. The amplifier increases the signal from the key fob, meaning thieves can unlock a car even if the owner is up to 90 meters (295 feet) away, according to researchers. Unlike more recent car hacks, it doesn’t involve manipulating software to get access.

This tactic actually predates most of the current concern over car hacking. It was first demonstrated by Swiss researchers in 2011, but Germany’s ADAC now says it has become much cheaper and easier. While the Swiss team spent thousands of dollars on their equipment, the ADAC setup only cost about $230. Researchers say their devices were not difficult to make, but they won’t release the exact method for security reasons.

ADAC found that 24 car models from 19 manufacturers were vulnerable to the amplifier attack. These were all European-market models, but some like the Audi A4, Kia Optima, and Land Rover Range Rover Evoque are sold in the U.S. The only car researchers couldn’t unlock was the electric BMW i3, though they were able to turn it on.

There is no complete fix for this problem right now. Since the attack requires ne’er-do-wells to place a device near a targeted key fob, though, drivers can at least protect themselves somewhat by keeping an eye out for suspicious activity.

Editors' Recommendations

Stephen Edelstein
Stephen is a freelance automotive journalist covering all things cars. He likes anything with four wheels, from classic cars…
Explosive claims of illegal spying and hacking rock the Uber vs. Waymo trial
Uber self-driving Volvo XC90

The newest twist in the Uber vs. Waymo trial over allegedly stolen self-driving technology sounds like something out of a Tom Clancy novel. A letter from a former Uber employee has been made public for the first time, claiming that some of the practices that Uber engaged in included covert hacking, illegal surveillance, and bribery of foreign officials.

Known as the “Jacobs letter,” it was written by former Uber security team member Richard Jacobs and sent to Uber executives last May. The trial was delayed in November when this new document came to light, after it was forwarded to Judge William Alsup by a US attorney also investigating Uber for a different matter. The judge blasted Uber’s lawyers in court, and questioned whether they had something to hide.

Read more
Hacked smart devices double as surveillance tools, new research finds
surveillance tool hacked smart devices wr 8 24 17 7

Hackers can turn smartphones, tablets, and smart TVs into surveillance tools by exploiting their built-in microphones, according to a new study out of the University of Washington. With the device hijacked, the attacker can detect body position and movement of people within its vicinity, raising additional concern about the security of smart devices, which made the news earlier this year with revelations about the ease with which they can be comprised.

“We were curious about the privacy threats that these devices can expose users to,” Shyam Gollakota, senior author of the study and UW associate professor of computer science and engineering, told Digital Trends. "So we asked the question, ‘How about a simple task of playing music on these devices? Can we use music to achieve surveillance on people?'”

Read more
Check out what this poor guy had to do in the name of driverless-car research
uber expands self driving car project with university of arizona partnership night driver

Driving around the streets all day disguised as a car seat won't be everyone's idea of the perfect job, but if it's in the interest of scientific research then some people may be persuaded.

A researcher from Virginia Tech was recently tasked with driving around Arlington, Virginia in an outfit that made him look like a car seat, apparently so that his team could gather data on people's reactions to driverless vehicles.

Read more