Bluetooth hack breaks into cars and smart locks 

Devices from deadbolts to car doors could be affected.

UK cybersecurity research firm NCC Group has revealed a weakness in Bluetooth Low Energy technology that potentially leaves millions of locks vulnerable — including those on your Tesla or home.

NCC Group senior security consultant Sultan Qasim Khan detailed the attack method.

“Many products implement Bluetooth Low Energy (BLE) based proximity authentication, where the product unlocks or remains unlocked when a trusted BLE device is determined to be nearby,” Khan wrote in a research report

Cybersecurity researchers have revealed a weakness in Bluetooth Low Energy technology that potentially leaves millions of locks vulnerable — including those on your Tesla or home.

Common examples of BLE products include phone-as-a-key systems on cars, residential smart locks, and smartphones. In a demo for Reuters, Khan opened and then drove a 2021 Tesla Model Y.

Khan hacked the BLE identification of Tesla Phone-as-a-Key entry system and Kwikset/Weiser residential smart locks using what is known as a “relay attack,” which uses two hardware devices — one near the BLE’s recognized device, the other near the lock it controls — to trick the lock into thinking its owner is nearby. 

By placing one relay device within 15 yards of a Tesla owner’s phone or fob, and another in his laptop near the car, Khan was able to “relay” the BLE identification from the owner’s device to his own, hijacking the ride in an example for Bloomberg News.

While NCC told Bloomberg that Tesla acknowledged that relay attacks can be an issue, fixing it would require changes to both their hardware and keyless entry system. Kwikset told Bloomberg that customers can use two factor identification and that the locks have a 30-second timeout when devices are stationary to help prevent intruders from getting in.

The vulnerability is to“relay attack,” which uses two hardware devices — one near a recognized device, the other near the lock it controls — to trick the lock into thinking its owner is nearby.

“The Bluetooth Special Interest Group (SIG) prioritizes security and the specifications include a collection of features that provide product developers the tools they need to secure communications between Bluetooth devices,” the company told Bloomberg in a statement. 

“The SIG also provides educational resources to the developer community to help them implement the appropriate level of security within their Bluetooth products, as well as a vulnerability response program that works with the security research community to address vulnerabilities identified within Bluetooth specifications in a responsible manner.”

Khan also recommended in his general report on BLE’s susceptibility to relay attacks that users be required to prove proximity — e.g., interacting with the BLE trusted device, like unlocking your phone or opening the app.

We’d love to hear from you! If you have a comment about this article or if you have a tip for a future Freethink story, please email us at tips@freethink.com.

Related
Why EV growth in US could be much faster than expected
Consumer preferences and technological trends suggest that most buyers will be ready to choose an EV by 2030.
Why has no one broken the land speed record for 25 years?
Two groups are competing to be the first to create a 1,000-mph car, which would shatter the current land speed record.
To fear AI is to fear Newton and Einstein. There are no “dragons” here. 
Who’s afraid of utopia? AI doubters have cold feet. History can warm them.
Apple Vision Pro wasn’t the only major announcement at WWDC23
On Day 1 of WWDC23, Apple announced three new Macs, several new operating systems, and the world’s most powerful personal computer chip.
Apple announces the Vision Pro XR headset
Apple has unveiled the Vision Pro, a VR/AR headset, at their annual WorldWide Developers Conference.
Up Next
Subscribe to Freethink for more great stories