BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • New method of car theft using NOKIA 3310 has appeared in the US

    The almighty phone can now start a car engine.

    A new type of car theft has emerged in the US, in which criminals use NOKIA 3310 phones to interact with the vehicle's control system.

    A new hijacking method allows a thief, even without technical experience, to steal cars without a key in 10-15 seconds. Thanks to devices that can be bought online for several thousand dollars, the barrier of entry to stealing even expensive luxury cars is drastically reduced.

    Ken Tindell, CTO of car cybersecurity company Canis Labs, spoke about the operation of such devices. Essentially, the device does all the work for the hijacker. All the thief has to do is hack the headlight and rip out the car's wiring. After that, the hijacker can connect the device to the CAN bus and send messages instructing the internal systems of the car to remove all blockages.

    This method of theft applies to Toyota, Maserati, Land Cruiser and Lexus vehicles. On the Internet and in various Telegram channels, this technology is sold at prices ranging from $2,700 to $19,600. Despite their high prices, some modified NOKIA 3310 phones contain components for as little as $10 - a chip with CAN hardware and firmware, as well as another chip related to with CAN.


    The researchers called the attack CAN Injection (Controller Area Network, CAN). In a CAN injection attack, thieves have the ability to send fake messages to the car's system as if they were coming from a smart key receiver. These messages allow you to unlock the vehicle and disable the engine immobilizer (anti-theft system), allowing the vehicle to be stolen.

    Once a device manufacturer reverse-engineered vehicle-specific messaging, each device would only take a few minutes to build. The whole job is to solder a few wires.

    According to the researchers, the only correct solution would be to introduce cryptographic protection for CAN messages. This can be done with a software update. “The software is simple and the only hard part is implementing the cryptographic key management infrastructure. But since new automotive platforms are already using cryptographic solutions, this infrastructure either already exists, or it still needs to be built, ”the experts noted.

    According to Ken Tindell, the problem is being actively discussed with various automakers, and there is every chance that in the next generations of popular brands access to the CAN bus will be implemented in a different way, or additional protection systems will be introduced, which will reduce the likelihood of car theft by this method.

    Earlier this month, Ken Tindell also described a way to hijack cars using a JBL Bluetooth speaker, based on direct access to the system bus through the headlight wiring. The worst thing is that cars of many brands are subject to this method, since in almost all modern models the wiring is organized in a similar way. The first to sound the alarm was Ian Tabor, a cybersecurity researcher and automotive consultant for EDAG. His Toyota RAV4 was prepared for theft for several days, gradually breaking into external electronic components.

    Author DeepWeb
    Singapore's Execution of Female Drug Offender Sparks Outrage
    Hackers use online casinos as a place to sell stolen millions of dollars

    Comments 0

    Add comment