Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20 - podcast episode cover

Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20

Apr 08, 202510 minEp. 20
--:--
--:--
Listen in podcast apps:
Metacast
Spotify
Youtube
RSS

Episode description

In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace.

From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding new attack vectors faster than manufacturers can plug the gaps. As a result, theft rates are soaring and entire automotive cyber security ecosystems—from fleets to insurers—are feeling the financial and operational pain.

We’ll discuss what’s being done to fight back, including the critical role of aftermarket AI-powered protection. Learn why OEMs are struggling, why the insurance market is shifting, and why AI-powered anti-theft protection solutions like vDome by PlaxidityX essential for any modern vehicle on the road today. This isn’t just car cyber-attack prevention—it’s a whole new era of proactive vehicle protection.

Chapters
(00:00) - Intro: Welcome to Cars, Hackers & Cybersecurity 
(00:12) - Real-World Example: Your Car is Gone 
(01:00) - Car Theft Overview: From Hotwiring to Hacking 
(01:55) - Car Theft Has Reached Epidemic Levels
(02:25) - Wreaking Havoc with the Entire Automotive Ecosystem
(03:52) - Cyber-Enabled Car Theft Techniques
(05:45) - How to Address the Car Theft Problem
(07:21) - How To Protect Vehicles Already on the Road: The Need for Aftermarket Protection
(08:55) - How Plaxidity X (formally Argus) Can Help
(09:37) - Outro: Stay Safe on the Road and in the Cloud

Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
[email protected] 

Transcript

00:00:00:11 - 00:00:03:14 Welcome to cars, hackers and cybersecurity. 00:00:04:03 - 00:00:07:03 Here we break down the latest in automotive cybersecurity, 00:00:07:03 - 00:00:10:17 helping you stay ahead in building secure connected vehicles. 00:00:12:18 - 00:00:21:04 Hi. Today we're diving into how cyber enabled car theft is transforming from hot wiring to hacking, and why it's now a global crisis. 00:00:21:16 - 00:00:33:07 It's Monday morning. You pull yourself out of bed, make a cup of coffee and head out to your car. When you reach the curb, you don't believe your eyes. The front bumper and headlight housing are partially detached. 00:00:33:09 - 00:00:41:13 The surrounding areas are scuffed in. The paint is chipped. Figuring it was a weekend teenager prank, you take the car to the shop and forget about it. 00:00:42:00 - 00:00:44:01 Two days later, your car is stolen. 00:00:44:14 - 00:01:00:01 If this sounds familiar, you're not alone. This and other types of sophisticated cyber enabled car theft have reached pandemic proportions, with repercussions across the industry from car owners and OEMs to fleet operators and insurance companies. 00:01:00:23 - 00:01:03:02 From hot wiring to hacking. 00:01:03:15 - 00:01:31:20 Traditionally, the tools of the trade for a car thief were a big rock to break the window and a hot wire to bypass the ignition. That's all you needed to drive away with the car. Then came the immobilizer about 20 years ago, which became the gold standard for anti-theft protection. Needless to say, immobilizer don't stand a chance against today's high tech car thieves, and we're seeing the results on our streets every day from an automotive cybersecurity standpoint. 00:01:31:22 - 00:01:53:14 The sophistication of today's software defined vehicles is a double edged sword. Keyless technology and other smart connected vehicle systems enhance safety and convenience for drivers. But at the same time, these technologies introduce new attack vectors that car thieves are leveraging to unlock, start and steal a car in less than 30s. 00:01:54:07 - 00:01:57:03 Car theft has reached epidemic levels. 00:01:57:08 - 00:02:01:22 Car theft has escalated into a national crisis in many countries. 00:02:02:00 - 00:02:25:04 In Canada alone, auto theft insurance claims surpassed $1.5 billion in 2023. Similarly, the United States reported over 1 million stolen vehicles in the same year, according to a Crime Trends report. Motor vehicle thefts increased by 39% in the first half of 2023 and by 21% in the second half of 2023, 00:02:25:22 - 00:02:29:03 wreaking havoc with the entire automotive ecosystem. 00:02:29:16 - 00:02:36:16 Vehicle theft is a multibillion dollar crime, costing vehicle owners more than $8 billion each year. 00:02:36:18 - 00:03:07:00 Besides the anguish for car owners, cyber theft impacts the entire vehicle ecosystem. OEMs in certain markets, in countries, specific car brands and models are known for being highly prone to theft. This linkage has a negative impact on brand reputation and sales for vehicle manufacturers. Insurance companies. High car theft rates means more claims against insurance companies, which in turn raise their premiums for consumers and fleet operators looking to avoid hassles and costs. 00:03:07:02 - 00:03:38:21 A growing number of insurance companies are reluctant to insure theft prone vehicle models. Fleet operators with insurance companies looking to avoid losses. Many fleet operators are now self insuring their vehicles and paying out of pocket for theft loss. The impact of increased car theft on consumers was reflected in a recently published Deloitte 2025 Global Automotive Consumer Study. Consumers from Europe, Asia and the U.S. were asked which vehicle connected services they were willing to pay extra for. 00:03:38:22 - 00:04:09:12 Anti-Theft tracking was among the most commonly cited services with 49 to 88% of respondents saying they were somewhat willing or very willing to pay extra to protect their vehicles from theft. Cyber enabled car theft techniques. Car theft has been around since the invention of the automobile. The only thing that's changed is the method used by the thieves. It's safe to assume that as vehicle technologies continue to advance, so will the techniques used by car thieves to steal vehicles. 00:04:09:12 - 00:04:12:14 Examples of common techniques used today include. 00:04:12:22 - 00:04:14:12 can injection attacks exploit 00:04:14:12 - 00:04:15:21 vulnerabilities in a vehicles 00:04:15:21 - 00:04:16:02 can 00:04:16:02 - 00:04:40:17 bus to allow thieves to steal vehicles in under 30 seconds without physical break in, using ready made hacking devices available for purchase on the darknet. Thieves can disable the immobilizer, unlock doors, start the engine, and drive away with the vehicle. Keyfob cloning. This technique relies on acquiring the tablets that carmakers use to reprogram key fobs. 00:04:40:18 - 00:05:02:15 For example, in the case where the owner lost the key. Thieves can easily find these devices on the black market and use them to gain access to a car's network by connecting to a port on the dashboard or through the headlight. Once the device sync to the car's network, a thief can use commands to register their own key as if it's a valid key and take control of the vehicle. 00:05:03:00 - 00:05:04:09 Relay attacks 00:05:04:14 - 00:05:26:06 are conducted by a pair of attackers, each with a small handheld device. One is near the keyfob, for example outside the owner's garage and the other is near the vehicle. The first device captures the key fob signal and relays it to the second device, which then transmits it to the car, tricking it into thinking the key is present. 00:05:26:08 - 00:05:44:19 This allows the thieves to start the engine and drive off without physically possessing the key fob. One of the reasons why cyber car theft is so prevalent is that none of these techniques requires technical or cyber expertise. The criminals simply buy a dedicated device on the web, learn how to connect it, and the device does the rest. 00:05:45:07 - 00:05:47:05 How to address the problem. 00:05:48:05 - 00:06:11:17 In countries where car theft is rampant, a great deal of effort has been invested in trying to recover vehicles. Many car owners and fleet operators use stolen vehicle recovery services required by many insurance companies. However, what's truly needed is a way to make vehicles more difficult to steal in the first place. We have seen that consumers are willing to pay for anti-theft protection to meet market needs. 00:06:11:17 - 00:06:14:19 Any such solution should be built on three pillars. 00:06:14:19 - 00:06:40:22 One. Detect. Detect vehicle theft attempts, such as unauthorized vehicle network manipulation or unauthorized keyfob registration to prevent prevent vehicle theft by triggering a theft prevention action in real time. For example, re-enable immobilizer that has been temporarily disabled by the attack or block fake message coming across the Can network. 00:06:41:00 - 00:07:10:18 Effective prevention requires the ability to distinguish between a valid and invalid scenarios. For example, reprograming a new key and prevent only the invalid ones. Three. Future ready support new and emerging vehicle theft attack vectors via ongoing software updates. Today there are three main attack vectors, but tomorrow there will be a new technique a vehicle produced today is going to be on the road on average for 10 to 15 years. 00:07:10:20 - 00:07:20:09 Anti-Theft protection solutions must be built with the infrastructure and tools to enable OTA security updates over the lifetime of the vehicle. 00:07:21:01 - 00:07:26:02 How to protect vehicles already on the road. The need for aftermarket protection 00:07:26:10 - 00:07:32:13 to comply with new cybersecurity regulations and standards, such as under 155 00:07:32:13 - 00:07:35:11 An ISO 21 434. 00:07:35:11 - 00:07:46:00 Vehicle manufacturers are developing their new vehicles with cybersecurity in mind. This includes secure coding in vehicle intrusion detection and prevention, and fleet protection. 00:07:46:00 - 00:07:51:17 capabilities. But when it comes to anti-theft protection, the industry is still playing catch up. 00:07:51:19 - 00:08:14:22 While OEMs would be glad to add anti-theft protection features or services, this can't be done retroactively. Let's say the OEMs decide today to design new security measures to address the surge in car theft. It's going to take a few years before these models hit the road. But how can they secure the millions of vehicles already on the road when a known vulnerability is detected in a vehicle? 00:08:15:00 - 00:08:34:18 The OEM can release a software update to the affected vehicles, but in practice, they can never address every vulnerability in every vehicle. If they could, then there would be little or no cyber enabled car theft. Not only that, with millions of cars on the road, it takes time to get the update out to the entire fleet. So what happens in the interim? 00:08:34:20 - 00:08:55:13 It is precisely this gap that has created a need for new aftermarket anti-theft protection services. Based on the pillars mentioned above. The magnitude of the car theft epidemic, as well as consumers willingness to pay for anti-theft protection, have created an opportunity for new types of protection services focused on cyber powered attacks. 00:08:55:13 - 00:09:23:12 How we can help. Park city ZV dome is an AI powered anti-theft protection solution that proactively detects and neutralizes malicious theft attempts in less than 200 microseconds. V dome identifies unauthorized activities on the vehicle network that indicate an attempt to steal the car, for example, electronic manipulations to unlock the doors and start the engine, and then triggers a theft prevention action in real time. 00:09:23:12 - 00:09:29:15 V dome software has already been integrated into Vodafone Automotives anti-theft solution. 00:09:30:08 - 00:09:37:08 Contact us to learn more about how V dome can help you protect vehicles from the latest cyber theft techniques. 00:09:39:01 - 00:09:44:23 That's all for today's episode. Keep your engines running smooth and your cyber defense is sharp. 00:09:44:23 - 00:09:49:11 Stay connected by subscribing and visiting placidity. X-Com. 00:09:49:12 - 00:09:53:12 Until next time, stay safe on the road and in the cloud.
Transcript source: Provided by creator in RSS feed: download file
For the best experience, listen in Metacast app for iOS or Android
Open in Metacast