Join +750K new investors every month who copy stock picks from billionaire's portfoliosSign Up Free

Keyless systems of many VW Group cars can be hacked - researchers

Published 11/08/2016, 18:10
© Reuters. File photo of VW sign outside a Volkswagen dealership in London
F
-
NXPI
-
VOWG_p
-

By Eric Auchard

FRANKFURT (Reuters) - Tens of millions of vehicles sold by Volkswagen AG (DE:VOWG_p) over the past 20 years, and some current models, are vulnerable to theft because keyless entry systems can be hacked using cheap technical devices, according to European researchers.

Computer security experts at the University of Birmingham have published a paper outlining how they were able to clone VW remote keyless entry controls by eavesdropping nearby when drivers press their key fobs to open or lock up their cars.

Vehicles vulnerable to this attack include most Audi, VW, Seat and Skoda models sold since 1995 and many of the approximately 100 million VW Group vehicles on the road since then, the researchers said. The flaw was found in car models as recent as the Audi Q3, model year 2016, they said.

"It is conceivable that all VW Group (except for some Audi) cars manufactured in the past and partially today rely on a 'constant-key' scheme and are thus vulnerable to the attacks," the paper said.

The only exception were cars built on VW's latest MQB production platform, which is used in its top selling model, the Golf VII, which the researchers found does not have the flaw.

"There are still some VW car models being sold that are not on the latest platform and which remain vulnerable to attack," Flavio Garcia, co-author of the report and a senior lecturer in computer security at University of Birmingham, told Reuters.

A VW spokesman said that its current Golf, Tiguan, Touran and Passat models are not at risk from the attack.

"This current vehicle generation is not afflicted by the problems described," VW spokesman Peter Weisheit said in a statement, without commenting on the risks to other models.

In their paper, the researchers did not identify the auto parts subcontractor that makes the affected keyless systems for VW and potentially other car makers. VW declined to comment on its supplier relationships.

Garcia and co-author David Oswald, also a lecturer at Birmingham University, are scheduled to present their paper at the Usenix security conference in Austin, Texas, on Friday.

The disclosures come as Europe's largest automaker struggles to overcome its biggest-ever corporate scandal, after it admitted to manipulating diesel emissions tests in about 11 million vehicles globally.

OTHER CAR MAKERS VULNERABLE

Attackers can use cheap and widely available tools for grabbing radio signals, according to the three researchers from the University of Birmingham in central England and a fourth who is a security consultant with Kasper & Oswald GmbH in Germany.

Cars from other manufacturers may share these flaws, including some model years of the Ford (N:F) Galaxy, the researchers said.

“We are aware of this security gap and have incorporated this knowledge in the enhancements of existing and future systems. We no longer use the described system in any of our new cars,” Ford Europe spokesman John Gardiner said.

The reports' authors said they had focused on mass-market models and did not analyse in detail VW's luxury brands including Porsche, Bentley, Lamborghini and Bugatti.

They first disclosed their findings to VW Group in November and met the company and the subcontractor involved in February and said VW had acknowledged the vulnerabilities.

The Wolfsburg-based automaker confirmed it has had a constructive exchange with the researchers and that the authors had agreed to withhold details in their report that savvy criminals could use to break into cars.

In 2013, VW obtained a restraining order against a group of researchers that included Garcia to prevent publication of a paper detailing how certain anti-theft car immobilisers were vulnerable to hackers.

That research was published in 2015 after the authors agreed with VW to remove a detail that would have allowed thieves to figure out how to carry out an attack.

Garcia, Oswald and their co-authors also describe a second attack that could be used against Hitag2 (HT2) remote keyless entry systems used in older models of other auto makers, running on circuits produced by Dutch-American chipmaker NXP (O:NXPI).

© Reuters. File photo of VW sign outside a Volkswagen dealership in London

An NXP spokesman said HT2 chips first introduced in 1998 have been gradually replaced by automakers since 2006 and that the chipmaker has advised them to replace HT2 chips in new cars since security weaknesses were reported in 2009 and 2012.

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.