Hackers Stole A £60,000 BMW

Doing little more than holding a bag up to the front door of a house a thief can steal a BMW.

Days after a Mercedes was said to have been taken in a similar way, a £60,000 BMW X5 vanished from its owners’ drive as they slept. The thieves were caught on CCTV using some sort of transmitting device inside the bag which is thought to extend the signal from the car’s keyless fob which was inside the house. 

How does the Technique Work?

Criminals stand near houses with a device that picks up the signal of the car key and relays it to an accomplice standing near the car with another transmitter, which unlocks and starts the vehicle.Drivers have been advised to take precautions such as turning off the fob’s radio signal, achieved on Mercedes cars by clicking it twice, or storing it in a metal-lined container.   

The car uses a keyless start system meaning it can be unlocked simply by having the fob close by. Both vehicles were stolen in Essex, prompting fears a gang is targeting new ‘keyless’ cars with high resale values.

Security expert Ray Anderson, whose firm covers Essex, said it was the fourth such theft he had heard of in the last four months. He warned the only way to protect against it may be to keep key fobs inside a metal box. There has also been advice to keep them in the fridge.
‘The metal blocks the signal,’ said Mr Anderson, of Classic Security Solutions. ‘We think these keyless fobs continually emit a signal. You can turn them off but most people don’t.
‘We think, from analysing CCTV, [the thieves] are using a device to extend the signal which makes it appear the fob is closer than it is.
‘Nothing special is required to use it. This whole thing was over in five minutes and there is not much chance of them getting it back.’

The owners were asleep when the car was stolen from their driveway at around 2am on April 4. They only realised it had gone the next morning. They did not want to be identified but have released the CCTV footage from their security cameras to warn others.

They said: ‘We are extremely concerned our BMW could be stolen in this way. We see this as a significant security breach.’ In the CCTV, two men can be seen sprinting towards the house. One goes to the car door while the other, holding a bag, stands by the front door of the house.

One of the men can then be seen moving the bag around outside the front door, apparently trying to detect a signal. Moments later, the car lights come on and the two men are inside and away. CCTV also showed the £35,000 Mercedes C220 being taken from a driveway in Grays on April 11. In this case the thieves went through a similar routine, with one man waving a bag near the wall of the house.

The car owners said the fob was stored at the back of their home, far from the drive. 

But they believe the thieves managed to hack it and extend its reach. Keyless vehicles do not have traditional ignition keys, instead coming with a plastic fob that contains a computer chip and security code.
When the fob is nearby, the code is detected by the car’s computer, allowing the driver to start the engine at the press of a button.

It is thought that thieves could be using a ‘relay’ strategy with a pair of radio transmitters. One gets as close as possible to the key fob inside the house by holding a transmitter close to the wall. The second holds his device by the car door. The devices relay a signal to unlock the vehicle.
Mercedes said it was not aware of any thefts relating to keyless start systems and said all its vehicles had extensive security systems.

A BMW spokesman said it was hard to tell from looking at stills of the theft how the car was stolen. He added: ‘This form of theft would appear to be extremely rare.’

An Essex police spokesman said: ‘We take car theft seriously and use a range of tactics to detect this.’ 

DailMail:

You Might Also Read:

Hackers Could Turn Off Your Car Engine – While You Are Driving:

Older Cars Can Connect To Modern Smartphones:

Twelve Things To Know About Self Driving Cars:

 

 

« NATO Cyber War Games 2017: Czechs Win
Cybersecurity Has A Metrics Problem »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Pluralsight

Pluralsight

Pluralsight helps enterprises build technology skills at scale with expert-authored courses on today’s most important technologies including information and cyber security.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

Secura

Secura

The Secura Cyber Security and Intelligence system predicts and prevents security threats by discovering hidden patterns through the meticulous analysis of large amounts of data.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

ReliaQuest

ReliaQuest

ReliaQuest’s GreyMatter solution connects existing technology, people, and process – then equips security teams with unified, actionable insights across their entire environment.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

SignalFire

SignalFire

SignalFire invest across both enterprise and consumer sectors at the seed and early growth stages.

Cytek

Cytek

Cytek is a leading provider of cybersecurity and HIPAA compliance for dental practices and other industries.