Stolen Computer Code Helped a Biker Gang Steal 150 Jeeps

Advertisement
By Hamza Shaban, The Washington Post | Updated: 2 June 2017 10:15 IST
Highlights
  • 9 biker club members have been charged with stealing 150 Jeep Wranglers
  • They did so by using stolen computer code and key designs
  • The total value of the stolen Jeeps was $4.5 million

In a cross-border auto heist that resembles a scrapped plot from the "Fast and the Furious" franchise, nine members of a Tijuana-based biker club have been charged with stealing 150 Jeep Wranglers using stolen computer code and key designs, the Justice Department announced earlier this week.

Known as the Hooligans, the biker gang allegedly stole the Jeeps in the San Diego area over the past several years, selling the vehicles or stripping them for parts, across the border in Mexico, US Attorney Mark Conover said during a news conference recorded by the San Diego Union-Tribune. The value of the stolen Jeeps was $4.5 million (roughly Rs. 29 crores).

According to the indictment, the Hooligans staked out vehicles days before the thefts to obtain their vehicle identification numbers. With these numbers in hand, the suspects were able to get details to create duplicate car keys as well as the codes needed to program the keys, linking them to the Jeep Wranglers. The key designs and codes were stored in a proprietary database. But law enforcement officials don't know how the Hooligans were able to access it.

Advertisement

In the course of the investigation, authorities said they learned that nearly 20 requests for duplicate keys were made by a single Jeep dealership, in Cabo San Lucas, Mexico.

Advertisement

Conover said the thefts only took a matter of minutes. After using the duplicate key to get inside the car, the Hooligan members used a handheld electronic device to pair the key with the car's computer to turn the engine on and drive off.

While Conover did not name the exact device that was used in the thefts, Katherine Fisher, a Tufts University computer science professor and security researcher, said that such key programmers are relatively cheap, and readily available online.

Advertisement

That auto companies or their partners maintain databases to store key and programming codes is not in itself unusual. After all, rightful car owners would need that information to create new keys if they were locked out, Fisher said. But in this case, it appears the security vulnerability may have been the integrity of the database. One way for criminals to extract stored information is to hack into a network that has access to it, she said. Another way is get authorized users to obtain the information themselves, and then pass it on, or to share active credentials with someone who shouldn't have them.

Experts say that widespread hacks of cars may soon become a reality. In an alarming demonstration captured by a widely read Wired article from 2015, researchers Charlie Miller and Chris Valasek showed that they could wirelessly hijack a 2014 Jeep Cherokee. The researchers could disengage the Jeep's brakes, cause the transmission to malfunction, and, at lower speeds, kill the engine altogether.

Advertisement

Hacking tools are easily spread online and pervasive software threats are costly to patch up. Car companies also face the challenge of justifying increased security costs to customers, Fisher said. A car's cybersecurity isn't the easiest thing to advertise, compared to say, horsepower or leg room. Outside of industry-wide pressure from regulators or insurers, individual companies may hesitate to spend more on security, despite the massive risks that hijacked and hacked cars pose.

"We don't do a very good job accounting for the cost of bad security," Fisher said.

© 2017 The Washington Post

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Lava Agni 4 Price Range, Features Leaked; Will Launch in These Colourways
  2. Apple's Low-Cost MacBook Launch Timeline, Price Leaked Ahead of Debut
  3. Motorola Edge 70 Launched With Snapdragon 7 Gen 4 SoC, Slim 5.99mm Profile
  4. Moto G67 Power 5G Launched in India With 7,000mAh Battery: See Price
  5. Samsung Galaxy S26 Ultra Spotted in Leaked Renders With Rounder Corners
  6. Moto G Play (2026), Moto G (2026) With Dimensity 6300 SoC Launched
  7. Realme UI 7.0 Launched With Light Glass Design, AI Features
  8. OnePlus Ace 6 Pro Max Configurations Leaked; May Feature Up to 16GB of RAM
  9. Apple's iOS 26.2 Developer Beta Rolled Out With This New Safety Feature
  1. Steam Deck Gets a Display-Off Low-Power Mode for Downloads Three Years After Launch
  2. Realme Will Try to Absorb Increased Cost of Components Ahead of Upcoming Product Launches, Executive Says
  3. Motorola Edge 70 Launched With Snapdragon 7 Gen 4 Chipset, Slim 5.99mm Profile: Price, Specifications
  4. Researchers Unveil How Atomic Entanglement Enhances Light Bursts
  5. Lava Agni 4 Confirmed to Launch in Two Colourways; Tipster Leaks Price Range, Key Features
  6. Google Proposes Play Store Reforms in Settlement With Fortnite Maker Epic Games
  7. Scientists Recreate Cosmic ‘Fireballs’ in Lab to Solve Mystery of Missing Gamma Rays
  8. Realme UI 7.0 Launched With Light Glass Design, AI Notify Brief and AI Gaming Coach: See Eligible Phones, Beta Release Schedule
  9. iOS 26.2 Beta 1 Rolled Out to Developers With Enhanced Safety Alerts, Reminder Alarms
  10. Samsung Galaxy S26 Ultra Spotted in Leaked Design Renders That Hint at Rounder Corners
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.