We explained how the keyless vehicle theft method, which has been appearing all over social media for a while, is carried out.
Over the last 15-20 years, automobiles have been continuously integrated with technology. As a result, connecting to the satellite, Transferring information via our phones making, accessing our contacts and keyless operation We see cars everywhere. But while we applaud all these innovations, there is a very important point that we miss; hackers.
Although manufacturers seem to provide us with the conveniences we have mentioned, hackers’ technical knowledge more than both ours and the manufacturers’. Of course, there would be a penalty for connecting all cars to the networks that these people could access by finding loopholes. The mysterious thing we have been seeing lately vehicle theft This is exactly the method.
Let’s see what happens first. What exactly are these people doing, checking the vehicle doors and going back and forth in front of the house?
First of all, we see that the thieves arrive in front of the house in a different vehicle. While one of the two people is taking care of the vehicle, the other is pretending to be performing a ritual. waiting at the door of the house. Then we see that the vehicle is unlocked. After a while, the vehicle Even though there is no key It works and the thieves take the car and run away.
Before explaining the method, you need to know:
When we want to unlock keyless vehicles, our car sends a signal that only the car key can respond to. Then when the switch also responds to this signal locks open. But it doesn’t end there. Because in order to start the car, the key must be inside. To understand this when you want to start the car Again, there is a signal transfer.
So in the first stage, our car is pressed to the key.hey, is that you?When he asks, our key is “Yes” he says and the door opens. the car when we want to run most of the time “Are you here?” and our key says “certainlyWe will be ready to go as he said.
What are thieves doing?
In the first stage of the video, the thief next to the vehicle with door handle While he is struggling, the other one comes carefully towards the front of the house. What the thief wants to do here is to pull the door handles and make the vehicle look for the key. So our car senses an action and uses it to unlock the locks. calling out to the key And that’s exactly what the thief wants to trigger.
When this signal is triggered, the thief’s device next to the vehicle transmits this signal to the other thief’s device. This thief, who seems to be performing a ritual, is inside the house. trying to contact the key. Most of the time, the range of these devices is around 10 meters. When this signal is transmitted to the switch, our switch transmits the correct signal back.
In other words, what the vehicle actually directs to the key is “are you?” the question is, through two thieves is transmitted to the switch. The key is “of course it’s meWhen you answer, this signal is transmitted from the thief’s device in front of the house to the one next to the car. When the car receives this answer, it opens the doors.
Sometimes this is not enough.
Because even though thieves can get into the car, they cannot get into the car because the key is not inside. the car may not start. For this reason, when the first thief enters the vehicle, the thief in front of the house walks away and comes back. In this way, it resets the connection.
When this process is repeated while the thief is inside the car, the car and the key are indeed stolen. he thinks he’s inside and the thieves get away easily. Of course, it is also possible that there will be no need to reset the connection if the Start/Stop button is pressed while continuing without interrupting the signal.
Now the real question is: Every time automakers say “We provide this much security, we prevent thisHe will continue to use sentences like “” in marketing. But does someone have to be victimized in order to close such gaps? Because despite all that software safest methodLooks like it was to bring one of the tires home after parking the vehicle. Ironically, this has nothing to do with software.
Of course, if you want to take precautions yourself, you can keep your keys in metal boxes that prevent signal transmission. In this way, the second thief communication with the key is blocked.
RELATED NEWS
If you have this intercom system at the door of your house, you are not as safe as you think! So why?
Source :
https://www.youtube.com/watch?v=D_3lgxMwrWI&ab_channel=SecurityResearcher