Remix.run Logo
tzs 6 days ago

> For this new attack to work, all that is needed is a single button-press capture from the keyfob, without any jamming. Just from that single capture, it is able to emulate all the keyfob's functions, including lock, unlock, and unlock trunk.

If I don't press the buttons on my keyfob am I safe from this?

The only keyfob functionality I normally use is that when it is outside the car but within about a meter of the door handle the door can be locked or unlocked by pressing a button on the door handle.

panki27 6 days ago | parent | next [-]

If you keep your car key close enough to your front door, it's possible to relay the signal that the key is constantly broadcasting closer to the car, allowing an attacker to hit the button on the handle and unlock it without posesssing the key.

waste_monk 6 days ago | parent | prev | next [-]

As I understand there's still challenge/response stuff going on when you use a physical key or similar means to unlock the car or start the ignition (as that is how the alarm system and immobiliser distinguish a real key from someone picking the lock or hotwiring the car).

I don't know the details of the attack in the article, but my speculation would be that it would be vulnerable.

ethagnawl 6 days ago | parent | prev [-]

That's an interesting question. Unless that feature uses NFC or some other protocol, I'd think you're still susceptible.

Gare 6 days ago | parent [-]

AFAIK it should be a different system because the car asks the key first (same system as Keyless GO).