What are the latest high-tech approaches to stealing vehicles?
That was the question I put to GPT 4o after thinking about the previous post for a day or two. I guess there was a Hollywood image of stealing cars in my head. Break open the ignition, rub a couple of wires together, and off you go. But any car or truck you could steal using that trick probably isn’t worth the effort. As always, GPT had some answers.
Good question, Steve—and a bit of a chilling one. Modern vehicle theft has gone high-tech in a big way, with thieves often outpacing traditional anti-theft measures. Here are some of the latest methods:
Relay Attacks
- How it works: Most modern cars use keyless entry systems. Thieves use two radio devices: one near the house to pick up the signal from the key fob, and another near the car to transmit that signal and unlock/start the vehicle.
- Why it works: The car thinks the fob is nearby. This can happen even if the key is inside the house.
- Counter: Store keys in a Faraday pouch or metal container.
CAN Bus Injection
- How it works: Thieves access the car’s CAN (Controller Area Network) system, often through a headlight or wheel arch. Once they tap into the network, they send fake signals to unlock and start the car.
- Why it works: It exploits how the car’s internal electronics communicate—no need for a key at all.
- Counter: Aftermarket immobilizers that require a PIN or Bluetooth tag.
OBD Port Hacking
- How it works: They access the On-Board Diagnostics port—usually under the dash—to program a blank key fob.
- Why it works: Many vehicles allow fob programming through the OBD without much security.
- Counter: Lockable OBD port covers or immobilizers.
Signal Jamming
- How it works: Thieves use signal jammers to block your fob’s signal when you try to lock the car, leaving it unlocked.
- Why it works: You walk away assuming it’s locked.
- Counter: Always manually check your door is locked.
Key Cloning
- How it works: They capture data from your fob (via RFID or physical access) and create a clone.
- Why it works: Older keyless systems don’t use rolling codes or encryption.
- Counter: Upgrade or disable vulnerable keyless features.
Telematics Exploits
- How it works: Some high-end thieves target vulnerabilities in mobile apps or remote control services offered by car manufacturers.
- Why it works: Poor app security or weak passwords can give them remote access.
- Counter: Use strong passwords, enable 2FA if available, and update apps regularly.
Social Engineering & Inside Jobs
- How it works: A blend of tech and trickery—like posing as a valet, mechanic, or using dealership tools from insider connections.
- Why it works: Trust + access = vulnerability.
- Counter: Be careful who you give your keys to.
Keyless vehicles typically have a key fob that beacons—meaning it’s always pinging the vehicle. In a relay attack, the thief (usually two) 1) has a receiver that picks up the fob’s beacon and relays that to 2) the second thief, who has a transmitter and stands next to your vehicle to unlock, start, and drive away.
A thief can pick up your beacon if they get within a few hundred feet of you and they can relay your beacon 1/4 mile away… there have been stories of thieves roaming a mall parking lot – a nice luxury car pulls in, and they wait for the person to get out… the “receiver thief” gets out and slowly starts following them until they get far enough away and in range, then bye-bye car. Similar but even faster at the local quickie-mart… it takes only seconds…
I was sleeping in a hotel when they got mine… likely one thief was standing at my truck while the other walked around the building and picked up my fob.
Once they drive off, they plug a laptop into the car’s diagnostic port and disable all the GPS/tracking/theft systems, and the vehicle literally disappears. Mine disappeared about a block from the hotel at a traffic light.
Would you believe older cars like your Land Rover or Jeep CJ2A are often less vulnerable to this kind of high-tech theft simply because they lack the systems being exploited? If car thieves ever start hacking carburetors, we’ll have bigger problems.