Researchers once again hack a Tesla Model S key fob
Owners of one Tesla model should maybe stop relying on just their key fob to unlock their car.
Researchers at Belgium University KU Leuven have reported that they've again successfully bypassed the keyless entry system of a Tesla Model S.
The team first announced their ability to unlock a Model S with a cloned key fob last September. But, on Tuesday, the university's Lennert Wouters presented evidence that they had managed to exploit a bug that bypassed Tesla's patch of that initial weakness, again allowing access to a locked Model S.
According to Wouters, it's a configuration bug in the encryption of the key fob, which is produced by electronics company Pektron, that would allow a hacker to crack the code by breaking only a little bit more sweat than previously required.
Despite Tesla and Pektron's upgrade from easily broken 40-bit encryption in the previous versions to far more secure 80-bit encryption in the newer key fobs—a doubling of the key length that ought to have made cracking the encryption about a trillion times harder—the bug allows hackers to reduce the problem to simply cracking two 40-bit keys. That shortcut makes finding the key only twice as hard as before.
Tesla told Wired that there's no evidence that anyone has successfully used this hack to steal a Model S (the hack doesn't affect other models since they use different key fobs). The company has already rolled out an easy-to-implement software update that fixes the issue and wirelessly updates the key fob in just a few minutes.
A spokesperson for Tesla told Mashable via email:
“While nothing can prevent against all vehicle thefts, Tesla has deployed several security enhancements, such as PIN to Drive, that makes them much less likely to occur. Even though we are not aware of a single customer ever affected by the reported issue, and enabling PIN to Drive already prevents this from occurring, we’ve begun to release an over-the-air software update (part of 2019.32) that addresses this researcher’s findings and allows certain Model S owners to update their key fobs inside their car in less than 2 minutes. We believe that neither of these options would be possible for any other automaker to release to existing owners, given our unique ability to roll out over-the-air updates that improve the functionality and security of our cars and key fobs.”
Additionally, Tesla's PIN-code-to-drive feature, once enabled by the driver, can prevent this sort of theft from occurring by allowing the driver to set a four-digit code that must be entered before the car can be driven.
It's not the first time a Tesla has been at the center of fob vulnerabilities. A video that circulated in the fall of 2018 purports to show a thief using a relay attack to steal a Model S. As we reported then, the thieves amplified "the signal from the car owner's key fob (located inside his home) in order to trick the vehicle into thinking the fob was present."
And yet another video claiming to show a similar relay attack theft was shared by Business Insider earlier this month.
To be fair, as Jalopnik notes, this sort of relay attack isn't unique to Tesla; it's a vulnerability that affects just about any car that utilizes a key fob. Our own Jack Morse showed you how to protect your car from such a relay attack back in 2017.
Tesla's popularity and name-recognition just bring more attention even as the Model S is one of the least-stolen cars, according to one study. Disabling Tesla's "passive entry" feature should prevent such a relay attack and its Sentry Mode offers another layer of security.
And, like the other theft attempts, these can be prevented by the added protection layer that comes with the PIN-to-drive feature which you should definitely enable, lest you allow your really, really expensive new ride to fall prey to some wily thieves.
Industry: Cyber Security
- CONTRACT- Security engineer AWS | SIEM. OUTSIDE IR35
- Outside IR35
Security engineer AWS | SIEM. CONTRACT OUTSIDE IR35 Deep understanding of AWS Security (Security Hub, Guard duty, Firewall Manager etc) Extensive experience with the development, implementation, monitoring and optimisation of SIEM solutions. Experience working within a cloud migration environment. Additional key experience with Hardening, DevOps, PKI etc Financial Service experience preferred. London Outside IR 35
- Architect | Cyber Security | Public sector Permanent
Architect | Cyber Security | Public sector Permanent Seeking a Security Architect with Public Sector / Cloud Security experience for a lead technical role. Public sector security architecture design experience essential. (MoD) Current project experience delivering HLD / assurance of computer networks / build evaluations. Active Security clearance required. If you are open to hear about a new / exclusive opportunity where you are interested to be more than a number in a company reach out to team today. Chris.firstname.lastname@example.org 07884666351
- CIAM Architect Azure B2C
We are seeking a highly skilled and experienced Azure B2C CIAM Architect for a contract starting on Jan 2024. As an Azure B2C CIAM Architect, you will be responsible for designing, implementing, and deploying an new Azure B2C Solution . Responsibilities: Design and implement an Azure B2C-based CIAM solution that meets the needs of our clients organization. Maintain and support the Azure B2C-based CIAM solution. Provide training and support to our employees on the use of the CIAM solution. Background designing, implementing, and maintaining CIAM solutions. Experience with cloud-based identity and access management (IAM) solutions. Experience with OAuth, OpenID Connect,and SAML. Excellent written and verbal communication skills
- Senior IAM Consultant
- Upto €110,000 depending on level of position
Senior IAM Consultant is needed to help lead and deploy IAM Projects for this expand IAM Consultancy The ideal candidate will have a deep understanding of IAM concepts and technologies, as well as experience in deploying and managing complex IAM solutions. Responsibilities Lead the deployment of IAM solutions for our clients Work with clients to understand their IAM requirements and design solutions that meet their needs Configure and implement IAM solutions using best practices Integrate IAM solutions with other enterprise systems Provide training and support to clients on the use of IAM solutions Stay up-to-date on the latest IAM technologies and trends We are looking for an experieneced IAM Consutlatn with: Strong understanding of IAM concepts and technologies,including identity lifecycle management,access control,and authentication Experience in deploying and managing complex IAM solutions Experience with IAM products and solutions,such as SailPoint,One Identity Manager,and Azure Active Directory Excellent communication and interpersonal skills Ability to work independently and as part of a team Fluent in German Candidates witll need to live and have the right to work within Germany to be considered.