Stolen Computer Code Helped a Biker Gang Steal 150 Jeeps

Advertisement
By Hamza Shaban, The Washington Post | Updated: 2 June 2017 10:15 IST
Highlights
  • 9 biker club members have been charged with stealing 150 Jeep Wranglers
  • They did so by using stolen computer code and key designs
  • The total value of the stolen Jeeps was $4.5 million

In a cross-border auto heist that resembles a scrapped plot from the "Fast and the Furious" franchise, nine members of a Tijuana-based biker club have been charged with stealing 150 Jeep Wranglers using stolen computer code and key designs, the Justice Department announced earlier this week.

Known as the Hooligans, the biker gang allegedly stole the Jeeps in the San Diego area over the past several years, selling the vehicles or stripping them for parts, across the border in Mexico, US Attorney Mark Conover said during a news conference recorded by the San Diego Union-Tribune. The value of the stolen Jeeps was $4.5 million (roughly Rs. 29 crores).

According to the indictment, the Hooligans staked out vehicles days before the thefts to obtain their vehicle identification numbers. With these numbers in hand, the suspects were able to get details to create duplicate car keys as well as the codes needed to program the keys, linking them to the Jeep Wranglers. The key designs and codes were stored in a proprietary database. But law enforcement officials don't know how the Hooligans were able to access it.

Advertisement

In the course of the investigation, authorities said they learned that nearly 20 requests for duplicate keys were made by a single Jeep dealership, in Cabo San Lucas, Mexico.

Advertisement

Conover said the thefts only took a matter of minutes. After using the duplicate key to get inside the car, the Hooligan members used a handheld electronic device to pair the key with the car's computer to turn the engine on and drive off.

While Conover did not name the exact device that was used in the thefts, Katherine Fisher, a Tufts University computer science professor and security researcher, said that such key programmers are relatively cheap, and readily available online.

Advertisement

That auto companies or their partners maintain databases to store key and programming codes is not in itself unusual. After all, rightful car owners would need that information to create new keys if they were locked out, Fisher said. But in this case, it appears the security vulnerability may have been the integrity of the database. One way for criminals to extract stored information is to hack into a network that has access to it, she said. Another way is get authorized users to obtain the information themselves, and then pass it on, or to share active credentials with someone who shouldn't have them.

Experts say that widespread hacks of cars may soon become a reality. In an alarming demonstration captured by a widely read Wired article from 2015, researchers Charlie Miller and Chris Valasek showed that they could wirelessly hijack a 2014 Jeep Cherokee. The researchers could disengage the Jeep's brakes, cause the transmission to malfunction, and, at lower speeds, kill the engine altogether.

Advertisement

Hacking tools are easily spread online and pervasive software threats are costly to patch up. Car companies also face the challenge of justifying increased security costs to customers, Fisher said. A car's cybersecurity isn't the easiest thing to advertise, compared to say, horsepower or leg room. Outside of industry-wide pressure from regulators or insurers, individual companies may hesitate to spend more on security, despite the massive risks that hijacked and hacked cars pose.

"We don't do a very good job accounting for the cost of bad security," Fisher said.

© 2017 The Washington Post

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Ek Deewane Ki Deewaniyat OTT Release Date: When and Where to Watch it Online?
  2. OnePlus 15T Display, Camera, and More Details Leaked Online
  3. Oppo Reno 15 Pro Mini India Launch and Key Specifications Tipped Online
  4. Electricity unlocks a greener way to build drug-ready heterocycles
  5. Vivo V70 Seres, X200T, and X300FE India Launch Timeline and Prices Leaked Online
  1. A Misanthrope Teaches a Class for Demi-Humans To Stream Soon on Crunchyroll
  2. Electricity-Driven Nitrogen Insertion Opens a Sustainable Path to Drug-Ready Heterocycles
  3. 90s - A Middle Class Biopic Out on OTT: Know Where to Watch This Telugu Drama Series
  4. Ek Deewane Ki Deewaniyat OTT Release Date: When and Where to Watch it Online?
  5. OnePlus 15T Display, Camera, and More Details Leaked Online
  6. Industry OTT Release Date: When and Where to Watch it Online?
  7. Human Specimens Now Streaming on Prime Video: A Chilling Japanese Mystery You Shouldn’t Miss
  8. Santhana Prapthirasthu Now Streaming on Prime Video and JioHotstar: What You Need to Know
  9. Oppo Reno 15 Pro Mini India Launch and Key Specifications Tipped Online
  10. Samsung Galaxy Z Flip 8 Tipped to Feature Newly-Launched Exynos 2600 SoC
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.