Monday, April 28, 2025
HomeIoTHack the Car in Real Time - Car Alarm Flaw let Hackers...

Hack the Car in Real Time – Car Alarm Flaw let Hackers Remotely Hijack 3 Million Vehicles Globally

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a serious Vulnerability in famous vendors car alarm system that allows attackers to hijack the car remotely and kill the engine while driving, even steal the car.

These alarms available in the market for $5,000, that already fitted in several high-end cars and the critical vulnerabilities were discovered in two leading alarm vendors Viper and Pandora manufactured alarm systems.

Also, Pandora has since taken the claim off their web site as ‘unhackable’ and also said that they never faced any security breachs.

- Advertisement - Google News

Penetration Testers discovered the critical vulnerability in direct object references (IDORs) in the Pandora alarm system API.

This vulnerability allows to tamper the user account let attacker update the email address registered to the account without authentication, send a password reset to the modified address to compromise the account.

Researchers said “Another Smart Start alarm Viper vulnerability is an IDOR on the ‘modify user’ request. Although all of the other APIs are correctly checking for authorization, the /users/Update/xxxxx request is not being properly validated.”

This vulnerability resides in API system allows attackers to interact with the alarm system by issue a malicious request to change any users password and login.

Image indicate the password change operation

Similarly, Pandora vulnerability is an IDOR on a POST request:
 https://pro.p-on.ru/api/sputnik/workers?id=xxxx on the ‘email’ JSON parameter.


Post request for overwrite the existing email 

So once the email will be overwritten then the attacker possibly change the user password on Pandora vehicle alarm system and simply login to the app and obtain full functionality.

Lets Hijack the Car

Researchers demonstrate the process of hijacking the car once they take over the vulnerable alarm management accounts and currently This flaw affects up to 3 million vehicles globally.

They took the famous Range Rover car which installed with the alarm system. below image indicate the app control interface.


Real time car location

PentestPartners researchers said “track the car in real time and The driver now pulls over to investigate. We set the immobiliser, so they can’t drive off. We have already removed their access to the alarm account, so they can’t reset the immobiliser.”

In this case, once the attackers found the car then they can use the unlock future in the mobile app to unlock the car door and against start the engine.

Researchers also discovered that attackers could kill the engine on the Viper equipped car whilst it was in motion.

“Promotional videos from Pandora indicate this is possible too, though it doesn’t appear to be working on our car.”

Also there are many functionalities can be obtained by the attacker from this car alarm app and they perform the following actions,

  • The car to be geo-located in real time
  • The car type and owner’s details to be identified
  • The alarm to be disabled
  • The car to be unlocked
  • The immobiliser to be enabled and disabled
  • In some cases, the car engine could be ‘killed’ whilst it was driving
  • One alarm brand allowed drivers to be ‘snooped’ on through a microphone
  • Depending on the alarm, it may also be possible to steal vehicles

“These alarms are expensive and are typically fitted to high-end vehicles, often those with keyless entry. A conservative estimate suggests that $150 Billion worth of vehicles were exposed”. Researchers said.

“This serious flaw has been reported already to the concern vendors and gave them 7 days to take down or fix the vulnerable APIs”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

PASTA – A New Car Hacking Tool Developed by Toyota to Test The Security Vulnerabilities

Moscow’s Cable Car System Hacked Within Two Hours After it Opened

Beware – Dangerous IoT Attacks Leads Some One to Hack and Control Your Car

CarsBlues Bluetooth Hack Allows Hackers to Access Text Messages, Call Logs and More

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

WooCommerce Users Targeted by Fake Security Vulnerability Alerts

A concerning large-scale phishing campaign targeting WooCommerce users has been uncovered by the Patchstack...

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...