1. A cybersecurity researcher discovered a sophisticated technique for performing keyless thefts called CAN injection attacks.
2. Thieves use "emergency start" devices to bypass the entire smart key system and inject malicious messages into the car's Controller Area Network (CAN) to take control of the vehicle.
3. This form of keyless vehicle theft is a newer and more advanced method than relay attacks, which amplify the signal between the car and the keyless entry fob used to unlock and start it.
The article from Ars Technica discusses a new form of keyless car theft that can be performed in under two minutes. The article is based on the experience of a cybersecurity researcher who had his Toyota RAV4 stolen using a technique called CAN injection attacks. The article provides a detailed explanation of how the attack works and how it differs from previous keyless car theft techniques.
The article appears to be well-researched and provides a lot of technical detail about the attack. However, there are some potential biases and missing points of consideration that should be noted.
Firstly, the article focuses solely on the perspective of the victim and the cybersecurity researcher who investigated the attack. There is no input from law enforcement or other experts in the field, which could provide additional insights into the prevalence and severity of this type of car theft.
Secondly, while the article notes that car owners have taken steps to protect themselves against relay attacks, it does not mention any potential solutions or countermeasures for CAN injection attacks. This could leave readers feeling helpless or vulnerable to this type of attack.
Thirdly, while the article mentions that emergency start devices can be used by thieves to perform CAN injection attacks, it does not provide any evidence or examples of this happening in real life. This could lead readers to believe that this type of attack is more widespread than it actually is.
Overall, while the article provides valuable information about a new form of keyless car theft, it could benefit from additional perspectives and information about potential solutions or countermeasures for this type of attack.