SHARE
Enlarge / The all-new Toyota Camry. It's lower and wider and sleeker than before, and we think that from this angle it succeeded in making it look quite sporty.Jonathan Gitlin

Over the past few years, owners of cars with keyless start systems have learned to worry about so-called relay attacks, in which hackers exploit radio-enabled keys to steal vehicles without leaving a trace. Now it turns out that many millions of other cars that use chip-enabled mechanical keys are also vulnerable to high-tech theft. A few cryptographic flaws combined with a little old-fashioned hot-wiring—or even a well-placed screwdriver—lets hackers clone those keys and drive away in seconds.

Researchers from KU Leuven in Belgium and the University of Birmingham in the UK earlier this week revealed new vulnerabilities they found in the encryption systems used by immobilizers, the radio-enabled devices inside of cars that communicate at close range with a key fob to unlock the car's ignition and allow it to start. Specifically, they found problems in how Toyota, Hyundai, and Kia implement a Texas Instruments encryption system called DST80. A hacker who swipes a relatively inexpensive Proxmark RFID reader/transmitter device near the key fob of any car with DST80 inside can gain enough information to derive its secret cryptographic value. That, in turn, would allow the attacker to use the same Proxmark device to impersonate the key inside the car, disabling the immobilizer and letting them start the engine.

The researchers say the affected car models include the Toyota Camry, Corolla, and RAV4; the Kia Optima, Soul, and Rio; and the Hyundai I10, I20, and I40. The full list of vehicles that the researchers found to have the cryptographic flaws in their immobilizers is below:

EnlargeUniversity of Birmingham and Ku Leven

Though the list also includes the Tesla S, the researchers reported the DST80 vulnerability to Tesla last year, and the company pushed out a firmware update that blocked the attack.

Toyota has confirmed that the cryptographic vulnerabilities the researchers found are real. But their technique likely isn't as easy to pull off as the "relay" attacks that thieves have repeatedly used to steal luxury cars and SUVs. Those generally require only a pair of radio devices to extend the range of a key fob to open and start a victim's car. You can pull them off from a fair distance, even through the walls of a building.

By contrast, the cloning attack the Birmingham and KU Leuven researchers developed requires that a thief scan a target key fob with an RFID reader from just an inch or two away. And because the key-cloning technique targets the immobilizer rather than keyless entry systems, the thief still needs to somehow turn the ignition barrel—the cylinder you slot your mechanical key into.

That adds a layer of complexity, but the researchers note that a thief could simply turn the barrel with a screwdriver or hot-wire the car's ignition switch, just as car thieves did before the introduction of immobilizers neutered those techniques. "You're downgrading the security to what it was in the '80s," says University of Birmingham computer science professor Flavio Garcia. And unlike relay attacks, which work only when within range of the original key, once a thief has derived the cryptographic value of a fob, they can start and drive the targeted car repeatedly.

The researchers developed their technique by buying a collection of immobilizers' electronic control units from eBay and reverse-engineering the firmware to analyze how they communicated with key fobs. They often found it far too easy to crack the secret value that Texas Instruments DST80 encryption used for authentication. The problem lies not in DST80 itself but in how the carmakers implemented it: The Toyota fobs' cryptographic key was based on their serial number, for instance, and also openly transmitted that serial number when scanned with an RFID reader. And Kia and Hyundai key fobs used 24 bits of randomness rather than the 80 bits that the DST80 offers, making their secret values easy to guess. "That's a blunder," says Garcia. "Twenty-four bits is a couple of milliseconds on a laptop."

When WIRED reached out to the affected carmakers and Texas Instruments for comment, Kia and Texas Instruments didn't respond. But Hyundai noted in a statement that none of its affected models are sold in the US. It added that the company "continueRead More – Source

LEAVE A REPLY

Please enter your comment!
Please enter your name here