Close Menu
Beverly Hills Examiner

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Anthropic’s landmark copyright ruling is a victory for the AI industry—but the company is still on the hook for piracy claims

    June 24, 2025

    Trump Drops F-Bomb On Israel, Iran

    June 24, 2025

    Saints star Cameron Jordan urges NFL to ‘bring back taunting’

    June 24, 2025
    Facebook X (Twitter) Instagram
    Beverly Hills Examiner
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    Beverly Hills Examiner
    Home»Technology»Hackers Can Steal Your Tesla by Creating Their Own Personal Keys
    Technology

    Hackers Can Steal Your Tesla by Creating Their Own Personal Keys

    By AdminJune 9, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Hackers Can Steal Your Tesla by Creating Their Own Personal Keys


    As the driver enters the car after unlocking it with an NFC card, the thief begins exchanging messages between the weaponized Teslakee and the car. Before the driver has even driven away, the messages enroll a key of the thief’s choice with the car. From then on, the thief can use the key to unlock, start, and turn off the car. There is no indication from the in-car display or the legitimate Tesla app that anything is amiss.

    Herfurt has successfully used the attack on Tesla Models 3 and Y. He hasn’t tested the method on new 2021+ facelift models of the S and X, but he presumes they are also vulnerable because they use the same native support for phone-as-a-key with BLE.

    Tesla didn’t respond to an email seeking comment for this post.

    Parlez-Vous VCSec?

    The vulnerability is the result of the dual roles played by the NFC card. It not only opens a locked car and starts it; it’s also used to authorize key management.

    Herfurt said:

    The attack exploits Tesla’s way of handling the unlock process via NFC card. This works because Tesla’s authorization method is broken. There is no connection between the online account world and the offline BLE world. Any attacker who can see the Bluetooth LE advertisements of a vehicle may send VCSEC messages to it. This would not work with the official app, but an app that is also able to speak the Tesla-specific BLE protocol … allows attackers to enroll keys for arbitrary vehicles. Teslakee will communicate with any vehicle if it is told to.

    Herfurt created Teslakee as part of Project Tempa, which “provides tools and information about the VCSEC protocol used by Tesla accessories and the Tesla app in order to control vehicles via Bluetooth LE.” Herfurt is a member of Trifinite Group, a research and hacker collective that focuses on BLE.

    The attack is easy enough in technical aspects to carry out, but the mechanics of staking out an unattended vehicle, waiting for or forcing the owner to unlock it with an NFC card, and later catching up with the car and stealing it can be cumbersome. This method isn’t likely to be practical in many theft scenarios, but for some, it seems viable.

    With Tesla maintaining radio silence on this weakness, there’s only so much that concerned owners can do. One countermeasure is to set up Pin2Drive to prevent thieves who use this method from starting a vehicle, but it will do nothing to prevent the thief from being able to enter the car when it’s locked. Another protection is to regularly check the list of keys authorized to unlock and start the car through a process Tesla calls “whitelisting.” Tesla owners may want to perform this check after giving an NFC card to an untrusted mechanic or valet parking attendant.

    Based on the lack of response Herfurt said he received from Tesla regarding vulnerabilities he uncovered in 2019 and again last year, he’s not holding his breath that the company will address the issue.

    “My impression was that they always already knew and would not really change stuff,” he said. “This time, there is no way that Tesla does not know about that poor implementation. So for me, there was no point in talking to Tesla beforehand.”

    This story originally appeared on Ars Technica.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleOil Companies Tee up the Next Supreme Court Climate Showdown
    Next Article Tushy sale: Classic bidets are just $69 each when you buy 2

    RELATED POSTS

    Facebook Group admins complain of mass bans; Meta says it’s fixing the problem

    June 24, 2025

    NordVPN Coupon and Discount Codes: 76% Off

    June 24, 2025

    Databricks, Perplexity co-founder pledges $100M on new fund for AI researchers

    June 23, 2025

    What Satellite Images Reveal About the US Bombing of Iran’s Nuclear Sites

    June 23, 2025

    Why Danny Boyle shot ‘28 Years Later’ on iPhones

    June 22, 2025

    Truth Social Crashes as Trump Live-Posts Iran Bombing

    June 22, 2025
    latest posts

    Anthropic’s landmark copyright ruling is a victory for the AI industry—but the company is still on the hook for piracy claims

    In a test case for the artificial intelligence industry, a federal judge has ruled that…

    Trump Drops F-Bomb On Israel, Iran

    June 24, 2025

    Saints star Cameron Jordan urges NFL to ‘bring back taunting’

    June 24, 2025

    Facebook Group admins complain of mass bans; Meta says it’s fixing the problem

    June 24, 2025

    Weird line of galaxies may have been created by a cosmic bullet

    June 24, 2025

    Pixar Scrutiny Intensifies as Elio Crash Lands

    June 24, 2025

    Grant Ellis Calls Out Bachelor Nation Fans For Blatant Racism

    June 24, 2025
    Categories
    • Books (596)
    • Business (5,502)
    • Film (5,438)
    • Lifestyle (3,543)
    • Music (5,491)
    • Politics (5,489)
    • Science (4,849)
    • Technology (5,435)
    • Television (5,113)
    • Uncategorized (1)
    • US News (5,489)
    popular posts

    NASA’s Perseverance Mars Rover Has Been Carrying a ‘Pet Rock’ in its Wheel for Months

    NASA’s Perseverance Mars rover has been carrying around a ‘pet rock’ for the past four…

    How Daisy Ridley Was Lured Back to Lucasfilm Over Breakfast – The Hollywood Reporter

    November 22, 2023

    Roger E. Mosley, Magnum P.I. Star, Dead at 83

    August 8, 2022

    Elon Musk hands out $1 million checks to 2 Wisconsin voters after state Supreme Court declines AG request to stop him

    March 31, 2025
    Archives
    Browse By Category
    • Books (596)
    • Business (5,502)
    • Film (5,438)
    • Lifestyle (3,543)
    • Music (5,491)
    • Politics (5,489)
    • Science (4,849)
    • Technology (5,435)
    • Television (5,113)
    • Uncategorized (1)
    • US News (5,489)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    Pixar Scrutiny Intensifies as Elio Crash Lands

    June 24, 2025

    Grant Ellis Calls Out Bachelor Nation Fans For Blatant Racism

    June 24, 2025

    Italian Roots, Real Talk: Linda Perillo Keeps It Honest and Hip

    June 24, 2025
    © 2025 Beverly Hills Examiner. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT