• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

TechNews

Technology breaking news

  • Home
  • Startups
  • Science
  • Cybersecurity
  • Review

New Bluetooth hack can unlock your Tesla—and all kinds of other devices

May 19, 2022 by arstechnica.com Leave a Comment

When you use your phone to unlock a Tesla, the device and the car use Bluetooth signals to measure their proximity to each other. Move close to the car with the phone in hand, and the door automatically unlocks. Move away, and it locks. This proximity authentication works on the assumption that the key stored on the phone can only be transmitted when the locked device is within Bluetooth range.

Now, a researcher has devised a hack that allows him to unlock millions of Teslas—and countless other devices—even when the authenticating phone or key fob is hundreds of yards or miles away. The hack, which exploits weaknesses in the Bluetooth Low Energy standard adhered to by thousands of device makers, can be used to unlock doors, open and operate vehicles, and gain unauthorized access to a host of laptops and other security-sensitive devices.

When convenience comes back to bite us

"Hacking into a car from hundreds of miles away tangibly demonstrates how our connected world opens us up to threats from the other side of the country—and sometimes even the other side of the world," Sultan Qasim Khan, a principal security consultant and researcher at security firm NCC Group, told Ars. "This research circumvents typical countermeasures against remote adversarial vehicle unlocking and changes the way we need to think about the security of Bluetooth Low Energy communications."

This class of hack is known as a relay attack , a close cousin of the person-in-the-middle attack . In its simplest form, a relay attack requires two attackers. In the case of the locked Tesla, the first attacker, which we'll call Attacker 1, is in close proximity to the car while it's out of range of the authenticating phone. Attacker 2, meanwhile, is in close proximity to the legitimate phone used to unlock the vehicle. Attacker 1 and Attacker 2 have an open Internet connection that allows them to exchange data.

Attacker 1 uses her own Bluetooth-enabled device to impersonate the authenticating phone and sends the Tesla a signal, prompting the Tesla to reply with an authentication request. Attacker 1 captures the request and sends it to Attacker 2, who in turn forwards the request to the authenticating phone. The phone responds with a credential, which Attacker 2 promptly captures and relays back to Attacker 1. Attacker 1 then sends the credential to the car.

With that, Attacker 1 has now unlocked the vehicle. Here's a simplified attack diagram, taken from the above-linked Wikipedia article, followed by a video demonstration of Khan unlocking a Tesla and driving away with it, even though the authorized phone isn't anywhere nearby.

Relay attacks in the real world need not have two actual attackers. The relaying device can be stashed in a garden, coat room, or other out-of-the-way place at a home, restaurant, or office. When the target arrives at the destination and moves into Bluetooth range of the stashed device, it retrieves the secret credential and relays it to the device stationed near the car (operated by Attacker 1).

The susceptibility of BLE, short for Bluetooth Low Energy, to relay attacks is well known, so device makers have long relied on countermeasures to prevent the above scenario from occurring. One defense is to measure the flow of the requests and responses and reject authentications when the latency reaches a certain threshold, since relayed communications generally take longer to complete than legitimate ones. Another protection is encrypting the credential sent by the phone.

Khan's BLE relay attack defeats these mitigations, making such hacks viable against a large base of devices and products previously assumed to be hardened against such attacks.

  • Encrypted DMs: Elon Musk's new BIG plan to make Twitter 'best place ever'
  • How BenQ’s GV30 made me look at portable projectors in a new light
  • Your iPhone has an ‘invisible button’ on the screen that unlocks hidden features
  • Six HIDDEN iPhone features you’ve never heard of – including secret unlock codes
  • Thought Nokia's new £119 phone was cheap? This deal makes it even more affordable!
  • iPhone storage full – how to free up space in seconds with three clever hacks
  • Apple and Google plot to KILL passwords with new system – how it works
  • Terrifying screen sharing scam sees criminals hack bank accounts while helpless victims watch on their own computer
  • Garmin’s New Aviator Watch Partly Addresses a Risk the War in Ukraine Is Highlighting – Microtargeting
  • Nine ways to tell if your phone has been hacked from battery life to pop-up ads
  • How to hack a political party: The five attacks that Jeremy Corbyn and Boris Johnson should fear
  • The 12 Best Cameras For Every Kind Of Photographer
  • Virgin Media rivals Sky with a brand-new and more affordable way to watch TV
  • Deals: Apple’s new spring iPhone 13 cases see first discounts, Apple Watch Series 7 $99 off, more
  • Deals: 16-inch M1 Pro MacBook Pro falls to new low of $250 off, iPhone 12 refurb $480, more
  • Nokia's new £119 smartphone is here and you'll be amazed by what you get for that price
  • Foreo Bear Facial Review 2022: We tried the new microcurrent beauty device
  • Freeview users must retune to unlock talked-about new channel launching TODAY
  • The best Apple HomeKit-compatible devices for 2022 | Digital Trends
  • Urbanista Los Angeles headphones review: Give me more devices that don’t need to be charged
New Bluetooth hack can unlock your Tesla—and all kinds of other devices have 862 words, post on arstechnica.com at May 19, 2022. This is cached page on TechNews. If you want remove this page, please contact us.

Filed Under: Tech

Primary Sidebar

RSS Recent Stories

  • Oil Group Mocks Biden on Gas Prices Tweet: Intern Needs Econ Class
  • Joe Biden on Independence Day: America Has ‘Come Up Short’
  • Highland Park Attack Occurred Despite Stringent Gun Controls
  • iPhone 14 might be weaker than expected – here’s why
  • New stats show how much of your job really is a waste of time
  • Apple Watch 8 sounds more likely to get anticipated feature – but Watch SE 2 may not
  • Netflix cancels yet another animated show after one season
  • L’iPhone 14 serait moins puissant que prévu – voici pourquoi
  • Formula One driver survives horrific crash thanks to halo cockpit requirement
  • Opinion: We are thinking about AR/VR wrong

Sponsored Links

  • Major crash led to suspension of its Tesla Model 3 by taxi company
  • After Tesla, SpaceX workers come forward to speak on sexual harassment
  • Wi-Fi range extender to strengthen network coverage and internet speeds
  • apple: How to capture screenshot on Apple iPhone just by tapping back panel
  • EU Parliament backs tough new rules to rein in US tech giants
  • Carville: ‘Strap in People’ — January 6 Probe Will Expose Trump Was Behind a ‘Massive Criminal Act’
  • Warren: SCOTUS ‘Has Lost the Respect of the American People’ — We Need More Justices
  • Summers: Combatting Inflation Will ‘Require Substantially More’ Than What Fed Is Doing
  • Bratton: Lax District Attorneys, ‘Most of Them Funded by George Soros’ ‘Are Destroying the Criminal Justice System’
  • WATCH: Sheriff’s Deputies in Maryland Rescue Woman from Frigid Waters
Copyright © 2022 TechNews. Power by Wordpress.
Home - About Us - Contact Us - Disclaimers - DMCA - Privacy Policy - Submit your story