{"id":13506,"date":"2016-03-22T21:00:14","date_gmt":"2016-03-23T02:00:14","guid":{"rendered":"http:\/\/hcstx.org\/?p=13506"},"modified":"2016-03-22T21:00:14","modified_gmt":"2016-03-23T02:00:14","slug":"security-news-dozens-of-new-car-models-can-be-unlocked-and-started-with-a-cheap-radio-amp","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/03\/22\/security-news-dozens-of-new-car-models-can-be-unlocked-and-started-with-a-cheap-radio-amp\/","title":{"rendered":"Security News: Dozens of New Car Models Can be Unlocked and Started with a Cheap Radio Amp"},"content":{"rendered":"<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"Wie sicher sind Keyless-Schlie\u00dfsysteme? | ADAC 2016\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/xHCUpLBGIKQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div>\n<p>A group of German researchers from ADAC have published their work on extending last year&#8217;s <a href=\"http:\/\/boingboing.net\/2015\/04\/16\/17-radio-amp-lets-thieves-ste.html\">amplification attack<\/a> that let thieves steal Priuses with a $17 gadget that detected your key&#8217;s unlock signal and amplified it so it would reach the car.<\/p>\n<p>The researchers have shown that at least 24 different car models from 19 manufacturers are vulnerable to this attack, and can be unlocked and driven away with cheap, easy-to-make radio amps.<\/p>\n<p>The researchers say that thieves are already using this method to steal cars, and point to the surveillance video above as an example of a real-world theft.<\/p>\n<p>Audis have had a similar, unpatched vulnerability for at least five years &#8212; though its details have never been revealed because Volkswagen\u00a0<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2013\/08\/scientists_bann.html\">threatened to sue the researchers who discovered it<\/a>.<\/p>\n<blockquote><p><strong>Here\u2019s the full list of vulnerable vehicles from their findings, which focused on European models: <\/strong><\/p>\n<p>the Audi A3, A4 and A6, BMW\u2019s 730d, Citroen\u2019s DS4 CrossBack, Ford\u2019s Galaxy and Eco-Sport, Honda\u2019s HR-V, Hyundai\u2019s Santa Fe CRDi, KIA\u2019s Optima, Lexus\u2019s RX 450h, Mazda\u2019s CX-5, MINI\u2019s Clubman, Mitsubishi\u2019s Outlander, Nissan\u2019s Qashqai and Leaf, Opel\u2019s Ampera, Range Rover\u2019s Evoque, Renault\u2019s Traffic, Ssangyong\u2019s Tivoli XDi, Subaru\u2019s Levorg, Toyota\u2019s RAV4, and Volkswagen\u2019s Golf GTD and Touran 5T. Only the BMW i3 resisted the researchers\u2019 attack, though they were still able to start its ignition. And the researchers posit\u2014but admit they didn\u2019t prove\u2014that the same technique likely would work on other vehicles, including those more common in the United States, with some simple changes to the frequency of the equipment\u2019s radio communications.<\/p><\/blockquote>\n<p>Read the Original Article at <strong><a href=\"http:\/\/boingboing.net\/2016\/03\/22\/dozens-of-car-models-can-be-un.html\">BoingBoing<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A group of German researchers from ADAC have published their work on extending last year&#8217;s amplification attack that let thieves steal Priuses with a $17 gadget that detected your key&#8217;s unlock signal and amplified it so it would reach the car. The researchers have shown that at least 24 different car models from 19 manufacturers&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[74,2086,1189,5543],"tags":[10532,10533,10534,10535],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13506"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=13506"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13506\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=13506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=13506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=13506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}