Automotive cybersecurity experts have revealed that a hacking device known as a CAN injection device is being used by thieves to steal a wide range of car models. The device was used to steal the car of Ian Tabor of the EDAG Group, who started analyzing these attacks with Ken Tindell, CTO of Canis Automotive Labs, after his 2021 Toyota RAV4 was stolen last year.
Thieves pulled off the bumper and unplugged the headlight cables to reach wires connected to an electronic control unit (ECU) responsible for the vehicle’s smart key. The thieves likely connected a special hacking device that allowed them to unlock the vehicle and drive away.
Such hacking devices can be acquired on dark web sites for up to €5,000 ($5,500) and are advertised as ‘emergency start’ devices that can be used by vehicle owners who have lost their keys or automotive locksmiths.
Furthermore, the hacking device is designed to conduct what the researchers call a CAN injection attack, and the electronics responsible for hacking the vehicle are hidden inside a Bluetooth speaker case. The attack can be carried out by connecting the hacking device to other CAN wires, but the headlight wires are often the most accessible.
At the same time, the attacker does not need to directly connect to the smart key ECU but can reach the smart key ECU from the wires connected to other systems such as the headlight. The attacker connects the hacking device to the headlight wires and can send a specially crafted CAN message that tells the smart key receiver ECU that the key is validated. The attacker can then send a specially crafted CAN message to the door ECU to unlock the door, allowing the thieves to get in the car and drive away.
The problem is not specific to Toyota as similar hacking devices offered for sale to car thieves target many brands, including BMW, GMC, Cadillac, Chrysler, Ford, Honda, Jaguar, Jeep, Maserati, Nissan, Peugeot, Renault, and Volkswagen. The researchers reported their findings to Toyota, but without much success due to the fact that it’s not an actual vulnerability disclosure.
They believe all vehicle makers should read their report and take action to prevent CAN injection attacks. The report contains some recommendations that can be applied by manufacturers to prevent these types of attacks, and the researchers did manage to have a CVE identifier, CVE-2023-29389, assigned to the Toyota RAV4 hack.