Bluetooth hack breaks into cars and smart locks 

Devices from deadbolts to car doors could be affected.
Sign up for the Freethink Weekly newsletter!
A collection of our favorite stories straight to your inbox

UK cybersecurity research firm NCC Group has revealed a weakness in Bluetooth Low Energy technology that potentially leaves millions of locks vulnerable — including those on your Tesla or home.

NCC Group senior security consultant Sultan Qasim Khan detailed the attack method.

“Many products implement Bluetooth Low Energy (BLE) based proximity authentication, where the product unlocks or remains unlocked when a trusted BLE device is determined to be nearby,” Khan wrote in a research report

Cybersecurity researchers have revealed a weakness in Bluetooth Low Energy technology that potentially leaves millions of locks vulnerable — including those on your Tesla or home.

Common examples of BLE products include phone-as-a-key systems on cars, residential smart locks, and smartphones. In a demo for Reuters, Khan opened and then drove a 2021 Tesla Model Y.

Khan hacked the BLE identification of Tesla Phone-as-a-Key entry system and Kwikset/Weiser residential smart locks using what is known as a “relay attack,” which uses two hardware devices — one near the BLE’s recognized device, the other near the lock it controls — to trick the lock into thinking its owner is nearby. 

By placing one relay device within 15 yards of a Tesla owner’s phone or fob, and another in his laptop near the car, Khan was able to “relay” the BLE identification from the owner’s device to his own, hijacking the ride in an example for Bloomberg News.

While NCC told Bloomberg that Tesla acknowledged that relay attacks can be an issue, fixing it would require changes to both their hardware and keyless entry system. Kwikset told Bloomberg that customers can use two factor identification and that the locks have a 30-second timeout when devices are stationary to help prevent intruders from getting in.

The vulnerability is to“relay attack,” which uses two hardware devices — one near a recognized device, the other near the lock it controls — to trick the lock into thinking its owner is nearby.

“The Bluetooth Special Interest Group (SIG) prioritizes security and the specifications include a collection of features that provide product developers the tools they need to secure communications between Bluetooth devices,” the company told Bloomberg in a statement. 

“The SIG also provides educational resources to the developer community to help them implement the appropriate level of security within their Bluetooth products, as well as a vulnerability response program that works with the security research community to address vulnerabilities identified within Bluetooth specifications in a responsible manner.”

Khan also recommended in his general report on BLE’s susceptibility to relay attacks that users be required to prove proximity — e.g., interacting with the BLE trusted device, like unlocking your phone or opening the app.

We’d love to hear from you! If you have a comment about this article or if you have a tip for a future Freethink story, please email us at [email protected].

Sign up for the Freethink Weekly newsletter!
A collection of our favorite stories straight to your inbox
Related
AI is now designing chips for AI
AI-designed microchips have more power, lower cost, and are changing the tech landscape.
The next big tech trend will start out looking like a toy
In “Read, Write, Own: Building The Next Era of the Internet,” investor Chris Dixon explains why the biggest trends often go overlooked.
Constitutional warning shot for social media “deplatforming” laws
Can the government tell private websites what they have to publish?
The Supreme Court will soon decide the future of social media
Should social media platforms have the right to decide what speech is permitted? Should the government?
Why AI playing video games is a big deal
Google’s SIMA can follow human instructions to play 3D video games. Researchers hopes the platform can one day help AI navigate real-world environments.
Up Next
Subscribe to Freethink for more great stories