Stolen Computer Code Helped a Biker Gang Steal 150 Jeeps

Advertisement
By Hamza Shaban, The Washington Post | Updated: 2 June 2017 10:15 IST
Highlights
  • 9 biker club members have been charged with stealing 150 Jeep Wranglers
  • They did so by using stolen computer code and key designs
  • The total value of the stolen Jeeps was $4.5 million

In a cross-border auto heist that resembles a scrapped plot from the "Fast and the Furious" franchise, nine members of a Tijuana-based biker club have been charged with stealing 150 Jeep Wranglers using stolen computer code and key designs, the Justice Department announced earlier this week.

Known as the Hooligans, the biker gang allegedly stole the Jeeps in the San Diego area over the past several years, selling the vehicles or stripping them for parts, across the border in Mexico, US Attorney Mark Conover said during a news conference recorded by the San Diego Union-Tribune. The value of the stolen Jeeps was $4.5 million (roughly Rs. 29 crores).

Advertisement

According to the indictment, the Hooligans staked out vehicles days before the thefts to obtain their vehicle identification numbers. With these numbers in hand, the suspects were able to get details to create duplicate car keys as well as the codes needed to program the keys, linking them to the Jeep Wranglers. The key designs and codes were stored in a proprietary database. But law enforcement officials don't know how the Hooligans were able to access it.

In the course of the investigation, authorities said they learned that nearly 20 requests for duplicate keys were made by a single Jeep dealership, in Cabo San Lucas, Mexico.

Advertisement

Conover said the thefts only took a matter of minutes. After using the duplicate key to get inside the car, the Hooligan members used a handheld electronic device to pair the key with the car's computer to turn the engine on and drive off.

While Conover did not name the exact device that was used in the thefts, Katherine Fisher, a Tufts University computer science professor and security researcher, said that such key programmers are relatively cheap, and readily available online.

Advertisement

That auto companies or their partners maintain databases to store key and programming codes is not in itself unusual. After all, rightful car owners would need that information to create new keys if they were locked out, Fisher said. But in this case, it appears the security vulnerability may have been the integrity of the database. One way for criminals to extract stored information is to hack into a network that has access to it, she said. Another way is get authorized users to obtain the information themselves, and then pass it on, or to share active credentials with someone who shouldn't have them.

Experts say that widespread hacks of cars may soon become a reality. In an alarming demonstration captured by a widely read Wired article from 2015, researchers Charlie Miller and Chris Valasek showed that they could wirelessly hijack a 2014 Jeep Cherokee. The researchers could disengage the Jeep's brakes, cause the transmission to malfunction, and, at lower speeds, kill the engine altogether.

Advertisement

Hacking tools are easily spread online and pervasive software threats are costly to patch up. Car companies also face the challenge of justifying increased security costs to customers, Fisher said. A car's cybersecurity isn't the easiest thing to advertise, compared to say, horsepower or leg room. Outside of industry-wide pressure from regulators or insurers, individual companies may hesitate to spend more on security, despite the massive risks that hijacked and hacked cars pose.

"We don't do a very good job accounting for the cost of bad security," Fisher said.

© 2017 The Washington Post

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Vivo T5 Pro vs Oppo A6 Pro vs Lava Agni 4: Know What Is the Difference
  1. NASA Observes Rare Sungrazer Comet Disintegration Near the Sun
  2. Kolaiseval Out on OTT: Know Everything About This Tamil Psychological Thriller Film Online
  3. Band Melam OTT Release Date Revealed: Know When and Where to Stream it Online
  4. LEGO Friends: The Next Chapter Season 4 Now Streaming on Netflix: What You Need to Know
  5. Small NASA Satellite Could Reveal How Lightning Impacts Space Weather
  6. Piece by Piece: Pharrell Williams’ LEGO Documentary Now Streaming on Netflix
  7. Ustaad Bhagat Singh OTT Release: When & Where to Watch Pawan Kalyan’s Telugu Film Online
  8. Battleground Season 2 Now on OTT: Know Where to Watch This Ultimate Fitness Reality Show Online
  9. Apne Paraye Out on OTT: Know Where to Watch This Hindi Dub of Bengali Drama Series
  10. Scientists Just Created the Largest 3D Map of the Universe Ever to Study Dark Energy
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.