The tech used here is the popular Flipper Zero, an ethical hacker’s swiss army knife, capable of all sorts of things such as WiFi attacks or emulating NFC tags. Now, 404 Media has found an underground trade where much shadier hackers sell extra software and patches for the Flipper Zero to unlock all manner of cars, including models popular in the U.S. The hackers say the tool can be used against Ford, Audi, Volkswagen, Subaru, Hyundai, Kia, and several other brands, including sometimes dozens of specific vehicle models, with no easy fix from car manufacturers.

  • xthexder@l.sw0.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    7 hours ago

    Weren’t Kia Boys stealing cars with literally just a USB cable since it physically fit to turn the ignition behind the key cylinder?
    That doesn’t require buying a special device, it was mostly crimes of convenience. I doubt the Flipper Zero will ever get that widespread.

    • innermachine@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 hour ago

      You’d be surprised what people will pay for a striker hellcat. Yea it’s never gonna be as common, but it will happen. It is easier to steal a hellcat with a flipper zero than to pull apart a column to get behind the ignition and turn it without the key, if anything hacking into cars is quicker and easier than defeating a physical key! My SO push button 15 Jetta could easily be stolen with a flipper, but my 87 YJ with a physical key requires an understanding of the wiring system and the time to tear down the column to be stolen. Any dunce capable of buying a flipper loaded with appropriate software can easily steal any new push button car.

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    77
    arrow-down
    1
    ·
    13 hours ago

    If you can hack a car with a flipper zero, then the car manufacturers failed to implement the most basic security protocols. Complain to them, and demand a fix.

    • innermachine@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 hour ago

      Trouble is the move to complete computerization. Back in the day we had physical keys which turned a physical switch to physically connect the power from battery to wake ECU. Now, we have a button that sends a REQUEST to the ECU to turn on or off, and as long as an acceptable transponder is around it will accept the request. If you turn your car off when u hit that stop button it REQUESTS that the ECU shut down assuming conditions are met. I have had a problem 202w wrangler JL turn on fine but refuse to shut off untill you pulled the terminals off the battery. This new age hyper computerized nonsense is why every mechanic hates these new age techno bullshit wanna-be computer appliances on wheels, canbus can be awesome for keeping all modules on the same page but one bad wire and the whole system takes a shit.

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        14 minutes ago

        202w wrangler

        Well, Jeep is not really a name for good innovation. They are stuck with a management that still thinks “mechanics” and sees electronics as a pure profit center, not as a gear in the system that has to be as reliable as the rest of it.

    • douglasg14b@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 hours ago

      TBF most of these are failures and exploits on older devices.

      Which are a dime a dozen across the entire industry. Security is rather difficult, especially when considering exploits and bugs.

      Ofc many of these ARE the results of cut corners, though many are just a lack of security awareness or old devices with known exploits discovered long after manufacturing.

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        16 minutes ago

        The lack of security awareness is due to them to scrooge to hire the right professionals for the job. It is 100% the result of cutting corners.

    • YiddishMcSquidish@lemmy.today
      link
      fedilink
      English
      arrow-up
      21
      ·
      10 hours ago

      Fucking real! My car (2016 Toyota Avalon) uses a rolling code for the transponder! It’s like one of the most basic things any manufacturer can do to avoid this shit! And it can’t be more than a few dozen lines of code (I’m no expert so this may be an exaggeration)?

      • ArcaneSlime@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 hours ago

        Of course, this particular attack actually “works” with rolling codes (WILL desync your real keyfob), it requires the attacker to sniff one signal off your key (incl lock) and then they can spoof your key’s rollover protocol (and any button, not just the one they sniffed) to reset the rolling code back to 0 and allowing them access. Iirc it’s different from a standard replay attack in (definitely) that it can spoof other keys on the fob it hasn’t read, and (I think) that while a trad replay attack requires the car not to hear the signal when recording I believe that doesn’t matter with this attack.

        Unfortunately I haven’t been able to test it out since I’m not buying a serial locked flipper firmware from some guy who just got out of prison selling it on telegram.

        • YiddishMcSquidish@lemmy.today
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 hour ago

          What if I only use the fob as a fob? I usually only use the touch pad to lock and inner handle’s proximity sensor to unlock, so the car is only range finding after initial sense.

      • Doomsider@lemmy.world
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        1
        ·
        8 hours ago

        It is almost like their should be something written down somewhere. Like a guideline or rule or something…

        Oh that is right, it is called a regulation requiring basic wireless security for extremely expensive consumer items.

  • Ulrich@feddit.org
    link
    fedilink
    English
    arrow-up
    52
    ·
    edit-2
    12 hours ago

    It is true that this device can be used nefariously. But it’s just a computer with a wide variety of very basic and common communication methods along with software to exploit them. There are many other computers like it that are just less popular. And to ban it is to ban said basic communication hardware like radio, WiFi, NFC, etc.

    The solution is to mandate companies to provide a minimum level of security. Even giant companies with good reputations have giant security holes, like Apple or your bank, implementing mandatory SMS as 2FA. That shit should be illegal.

  • stealth_cookies@lemmy.ca
    link
    fedilink
    English
    arrow-up
    185
    ·
    20 hours ago

    The real issue here is that the systems that car manufacturers use for their vehicles are insecure and outdated. The Flipper Zero is just exposing their bad design decisions.

    • Getawombatupya@aussie.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      7 minutes ago

      On the bright side, all the car thieves that knew how to open a steering lock have all grown up, so a club lock is probably going to be the best defence outside of a kill switch. Great for road rage, too

    • AceBonobo@lemmy.world
      link
      fedilink
      English
      arrow-up
      48
      arrow-down
      1
      ·
      20 hours ago

      “We’re seeing an increase in new care purchases” “What changed?” “We made them super easy to steal”

  • cecilkorik@lemmy.ca
    link
    fedilink
    English
    arrow-up
    111
    ·
    20 hours ago

    And here I am just using my flipper zero to turn my fan on and off since the remote that came with it sucks.

    • TimeSquirrel@kbin.melroy.org
      link
      fedilink
      arrow-up
      39
      arrow-down
      1
      ·
      20 hours ago

      I use it at work to clone a customer’s proximity card when I work in their building so they don’t have to leave me theirs to get around. The one legitimate use I found.

      I guess being able to trigger the customer service announcement without having to find a button in a store is nice.

        • Capricorn_Geriatric@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          6 hours ago

          That’s the definition of a legitimate use.

          Cloning keycards temporarily with permission (until new ones are made.) Breaking into your own or a friend’s car because the keys were left inside (until you get the keys back)

          Cloning a TV remote just to lower the volume to a sane degree and turn it off (until they get a new TV, remote or find the old one).

          Legitimate is a anything that you’re allowed to do. It’s a simple process to test legitimacy:

          Did someone ask you if you can help?

          If yes, did you tell them what you’d do?

          If yes, did they agree?

          And once you did whatever it was they agreed to, did you keep your ability to do the same thing in the aim of doing something they didn’t consent to (once you cloned their car key, do you plan on stealing the car? Or once you cloned their remote, do you have an insatiable urge to fuck with them by abusing the remote?)

          If you answer “yes” to all except the last one, the use is legitimate in 99.9% of cases.

          The only reason this may be considered a non-legitimate use would be if you attached the exclusive economic right of making repairs or new keys to the OEM, which isn’t how a sane world works.

          <hr>

          And besides, tools like the Flipper truly are hacking tools. Today hacking has a bad rep, and the word used to mean more like hack something together.

          Imagine Bob who is a DIY type of guy. His TV starts falling apart because the plastic casing broke. Bob takes some duct tape and glues the casing together. As the TV stand is also a bit wonky, he takes some screws as well just to be safe. He doesn’t plan on keeping it for too long, just until he can find a fitting replacement that’s not too expensive. Most likely, he’s bound to keep it until the next Black Friday.

          Bob just successfully hacked something up to keep his TV from falling apart.

          That’s the origin of the word “hacking”. “To hack up” got shortened by attaching a new meaning to the verb, without bothering with the entire phrase, and making it relate only to electronic/digital hacking. So the TV example isn’t hacking, but it is hacking up. It means “to make some temporary fix until a proper one isn’t found”.

          Today, hacking has been conflated with exploiting and breaking digital locks, which is not what the original phrase meant.

        • MartianSands@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          39
          arrow-down
          2
          ·
          20 hours ago

          That’s probably debatable, if they have permission. They probably shouldn’t have been given permission, but that’s a separate issue

          • Nougat@fedia.io
            link
            fedilink
            arrow-up
            30
            ·
            20 hours ago

            Ideally, there should be a visitor card available to be used, with its clearances configured as appropriate for the visitor in question. Having a person hand over their own card (and PIN, if applicable) isn’t a great idea either, but it’s far better than copying that card, with or without permission (probably without, if we’re being honest).

            • MartianSands@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              14
              ·
              20 hours ago

              Oh, absolutely. It’s not something which should be encouraged, and against a well designed modern system it probably isn’t possible (there must be some challenge-response type NFC systems on the market).

              I’m just saying it isn’t unambiguously “illegitimate”

              • kn33@lemmy.world
                link
                fedilink
                English
                arrow-up
                4
                ·
                18 hours ago

                there must be some challenge-response type NFC systems on the market

                There are. Hotels use them for door key cards so they can’t be cloned.

                • possumparty@lemmy.blahaj.zone
                  link
                  fedilink
                  English
                  arrow-up
                  5
                  ·
                  17 hours ago

                  Unfortunately… I was trying to clone a room key to my phone so I could just tap to enter when I stay 10 weeks in the same room.

          • TimeSquirrel@kbin.melroy.org
            link
            fedilink
            arrow-up
            12
            ·
            17 hours ago

            I usually do it when we take over a customer’s access control system and we we have half their doors on the new system and half in the old still and are migrating them over. I’m an electronic security tech, this is what I do for a living.

        • ozymandias@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          6
          ·
          edit-2
          19 hours ago

          le·git·i·mate adjective /ləˈjidəmət/

          1. conforming to the law or to rules.

          “Do what thou wilt shall be the whole of the law” - Aleister Crowley

          seems legit to me…

      • cecilkorik@lemmy.ca
        link
        fedilink
        English
        arrow-up
        8
        ·
        20 hours ago

        Oh I think I used it to unlock some extra characters in Skylanders at some point too, but I don’t really play those types of games anymore.

    • Sabata@ani.social
      link
      fedilink
      English
      arrow-up
      9
      ·
      19 hours ago

      I like to hijack the robot vacuum when I go to DnD and ring my parents doorbell when I visit.

        • Sabata@ani.social
          link
          fedilink
          English
          arrow-up
          6
          ·
          16 hours ago

          I would let all the power go to my head with that one. Not that I go outside, let alone to bars.

          • ArcaneSlime@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            5
            ·
            15 hours ago

            Sometimes you gotta do what you gotta do, unless you want to hear Kid Rock butcher Sweet Home Alabama (which itself butchered Werewolves of London, and was only still good because you can hear Van Zandt drop his donuts, goddamn, in the back of the track) for the fourth time tonight.

            • maccentric@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              2
              ·
              4 hours ago

              Didn’t Sweet home Alabama precede Werewolves of London? Also, what does “drop his donuts” mean in this context?

              • ArcaneSlime@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                2 hours ago

                Yes, which is why it’s weird they were able to steal it, gol’dang time travelers. No I wasn’t mistaken, time travelers. No I’m not bias because Warren Zevon rules, I said time travelers.

                “Drop his donuts” means his dough circles fell off a table during the studio recording. You can hear him say “my donuts! Goddamn!” in the back of the track, it’s hilarious.

        • Sabata@ani.social
          link
          fedilink
          English
          arrow-up
          4
          ·
          17 hours ago

          The physical IRL location where I show up to play Dungeons n Dragons, and not in game. DM’s got a robot vacuum.

    • paraphrand@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      20 hours ago

      You can get devices that connect to home assistant for that too! (Just a comment, not a suggestion that you are doing anything wrong.)

  • potatopotato@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    37
    ·
    19 hours ago

    To be clear, the flipper is just a Girl Tech IM-me with an NFC chip. If it lets people do a thing, that thing has been possible for decades. Just wait until someone makes a popular device based on a cheap fully featured wideband SDR like the AD9363 or LMS7002. Shit is gonna get fucking wild.

    • mesa@piefed.social
      link
      fedilink
      English
      arrow-up
      9
      ·
      16 hours ago

      Lol yeah a very cheap rtlsdr with a chip for transmission can do the same as a flipper. Flipper just makes it easy.

  • pepperprepper@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    15 hours ago

    Thought cars were bad, not sure many people have an understanding of how our emergency broadcasts and alerts work. US needs some huge infrastructure updates.

    • ayyy@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      14 hours ago

      Can you be more specific? It’s not like you’re the first person to think about the nefarious uses of emergency alerts.

      • pepperprepper@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        9 hours ago

        I dont want to be too specific, there is a reason, I work with radio infrastructure quite a bit. A lot of these systems hide behind obscurity alone. Not great against national actors that may want to do harm.

  • muusemuuse@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    6
    ·
    15 hours ago

    I kinda want to see if this would work on my car since the proximity detection of the keyfob only works about half the time anyway.

  • Ballissle@lemmy.zip
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    1
    ·
    19 hours ago

    Really? I see these fairly often on local fb marketplace. I was tempted out of curiosity to get one but I dont have a use outside of mucking about.

    • Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      5
      ·
      16 hours ago

      They don’t really have many legitimate, practical uses for most people. They’re ideal for pentesters.

      • Ecco the dolphin@lemmy.ml
        link
        fedilink
        English
        arrow-up
        3
        ·
        10 hours ago

        Prentending to be hackerman is a legit usecase IMHO. They do seem like fun, but I personally can’t justify the cost.

        I would definitely play with one if I had one

  • dorumon@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    10
    ·
    17 hours ago

    Yes let me stalk someone to steal their car temporarily. Honestly this thing is kinda a toy on par with my rooted LG V20 with its IR blaster and USB C port that I can plug anything into or my HP stream with a software defined radio I played around with. These people are kinda making software for the wrong type of devices to be frank with ya and I cannot wait until someone makes some weird app and USB C dongle for an android phone to replace the Flipper Zero with. You don’t even need to have root access for this as apps can just take over the USB port anyway on your phone.

    • xthexder@l.sw0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      7 hours ago

      I think you’re missing the point this article is trying to make… It’s not an advertisement for Flipper Zero, it’s a scare piece implying the device’s existence is bad

    • ayyy@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      ·
      14 hours ago

      SDR devices with usb support and controlled by android apps is very much already a thing.