Monday, April 7, 2025
HomeCyber Security NewsHacking Kia Cars Remotely with a License Plate

Hacking Kia Cars Remotely with a License Plate

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers have uncovered a significant vulnerability in Kia vehicles that allowed hackers to remotely control key functions using nothing more than a car’s license plate.

This breach, discovered on June 11, 2024, exposed the potential for unauthorized access to personal information and vehicle control, raising serious concerns about automotive cybersecurity.

The Discovery

According to the Samcurry reports, the vulnerability was identified by a group of ethical hackers who had previously investigated security flaws in various car manufacturers.

- Advertisement - Google News

Their latest findings revealed that attackers could execute remote commands on Kia vehicles equipped with specific hardware in as little as 30 seconds.

This breach did not require an active Kia Connect subscription, making it accessible to many vehicles.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

How the Hack Works

The attack method involved entering a Kia vehicle’s license plate into a specially designed tool.

The tool then allowed the hacker to execute commands such as locking or unlocking doors, starting or stopping the engine, and even accessing the vehicle’s camera system.

The tool also enabled attackers to silently gather personal information, including the owner’s name, phone number, email address, and physical address.

HTTP Request to Unlock Car Door on the “owners.kia.com” website

POST /apps/services/owners/apigwServlet.html HTTP/2
Host: owners.kia.com
Httpmethod: GET
Apiurl: /door/unlock
Servicetype: postLoginCustomer
Cookie: JSESSIONID=SESSION_TOKEN;

Vehicles Affected

The breach affected several models across different years. Notable among them were the 2025 Carnival EX, SX, LX, and Hybrid versions, as well as the 2025 K5 and Sportage models.

The vulnerability allowed for remote lock/unlock and start/stop across these models.

Full high level attack flow
Full high level attack flow

The implications of this vulnerability were profound. An attacker could effectively take control of a vehicle without the owner’s knowledge or consent.

The ability to track vehicles and issue commands remotely posed significant risks to privacy and safety.

Hacking a car using just the license plate
Executing commands on the compromised vehicle
Executing commands on the compromised vehicle

Response from Kia

Upon discovering the vulnerability, the researchers promptly reported it to Kia. The company has since implemented fixes to address the security flaws.

Kia confirmed that there was no evidence of malicious exploitation of these vulnerabilities before they were patched.

This incident underscores the importance of ethical hacking in identifying and mitigating potential security threats.

The researchers involved in this discovery have previously worked on uncovering vulnerabilities in other car manufacturers, contributing significantly to automotive cybersecurity.

As vehicles become increasingly connected and reliant on digital systems, ensuring robust cybersecurity measures is paramount.

Manufacturers must prioritize security in their design processes and remain vigilant against emerging threats.

The revelation of this vulnerability serves as a stark reminder of the potential risks associated with connected vehicles.

While Kia has taken steps to rectify the issue, ongoing vigilance and proactive security measures are essential to protect consumers from similar threats in the future. 

Analyse AnySuspicious Links Using ANY.RUN's New Safe Browsing Tool: Try It for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified...

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app...

ToddyCat Attackers Exploited ESET Command Line Scanner Vulnerability to Conceal Their Tool

In a sophisticated cyberattack, the notorious ToddyCat APT group utilized a previously unknown vulnerability...

Threat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Cybercriminals are intensifying phishing campaigns to spread the Grandoreiro banking trojan, targeting users primarily...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified...

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app...

ToddyCat Attackers Exploited ESET Command Line Scanner Vulnerability to Conceal Their Tool

In a sophisticated cyberattack, the notorious ToddyCat APT group utilized a previously unknown vulnerability...