EXCLUSIVE: Ultra-wideband radio has been heralded as the solution for “relay attacks” that are used to steal cars in seconds. But researchers found Teslas equipped with it are as vulnerable as ever.
Oh no, a more expensive subscription (for insurance) for a car that makes you already subscribe to be a beta tester of a technology that runs you into the side of a train!
Why would they love this? More claims means they have to pay out more. Even if they're assholes and don't pay out, they still have to process and fight claims which costs money.
If you have a Tesla and you're worried about this it's probably worth enabling pin to drive. Not sure about all the other brands that are impacted but hopefully they have a similar feature.
Couldn't a Model 3/Y owner also just disable the phonekey and use the NFC cards? NFC only broadcasts a few inches right? I would think that would be VERY hard for a malicious actor to capture with relay/replay attack.
Following that, is it possible to use the Phonekey only in NFC mode or is it always broadcasting on Bluetooth LE and NFC?
Removing permission for "nearby devices" - this unfortunately appears to block both Bluetooth and NFC permission
Turning off the phone's Bluetooth - NFC still works while the Bluetooth radio is off, but you'd basically never be able to safely use Bluetooth anytime you aren't watching your car. Setting a PIN is still unfortunately the only way to go, and hope that a dedicated attacker doesn't also find a way to capture your PIN (e.g. camera zoomed in on your screen).
One of my coworkers carries a flipper zero around and opens up every single Tesla gas door we see. He hasn't tried it on the cybertruck yet, the ones I see are usually on the move.
Where I am from It is very common that people break in and only steal the loose valuables inside the car. Not the car itself. If you don't even have to crack a window i would imagine it is very enticing to do so and specialize in Teslas.. with that said, I can't magine Teslas are more prone to this and other brands. What makes Teslas a bigger target is that their fleet is large and use very similar components and tech. If you hack one, you can hack into alot of them.
As a Tesla owner I’m probably biased, but I do not fear these attacks at all. Thing is, because a Tesla is so connected to the mothership (and I definitely realise that’s both a good and a bad thing), chances of a thief actually being able to use or sell the vehicle are very slim. Tesla always knows where their cars are, and urning off GPS and LTE ruins 90% of the features in the car. I think thieves know this because I haven’t heard of any Tesla getting stolen and not being retrieved (but n=1).
Used Tesla battery is actually in demand though. Is the exploit is accessible enough, eventually thieves would target it to sell the battery in the used market for electric car conversion kits, solar power storage kits, etc.
I know! But Teslas are still connected to ‘Homebase’. I’m looking at it like Apple. Steal an iPhone? They’ll brick it remotely. This does scare thieves, one way or another. If there is a thief that is able to negate all the remote interception capabilities, sure… but the numbers of the people capable of that are low.
People usually use flipper zero (banned in Canada) to play with these kind of stuff. Not sure if this exploit can be implemented in flipper zero though.