{"id":51383,"date":"2023-04-07T13:00:00","date_gmt":"2023-04-07T13:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/cybercriminals-can-steal-your-car-novel-iot-hack"},"modified":"2023-04-07T13:00:00","modified_gmt":"2023-04-07T13:00:00","slug":"cybercriminals-can-steal-your-car-using-novel-iot-hack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/","title":{"rendered":"Cybercriminals &#8216;CAN&#8217; Steal Your Car, Using Novel IoT Hack"},"content":{"rendered":"<p>Automotive security experts have uncovered a novel method for <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/tesla-model-3-hacked-2-minutes-pwn2own-contest\" target=\"_blank\" rel=\"noopener\">stealing cars<\/a> by breaking into their control systems through a headlight.<\/p>\n<p>The key (so to speak) is the controller area network (CAN) bus, the Internet of Things (IoT) protocol through which devices and microcontrollers in a vehicle communicate with one another. It\u2019s basically the car&#8217;s onboard, local communications network that cyberattackers can subvert to potentially stop and start the car, open doors and windows, play around with the radio, and much more.<\/p>\n<p>While <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/state-trooper-vehicles-hacked\" target=\"_blank\" rel=\"noopener\">car hacking is hardly new<\/a>, in a <a href=\"https:\/\/kentindell.github.io\/2023\/04\/03\/can-injection\/\" target=\"_blank\" rel=\"noopener\">blog post published April 3<\/a>, Ken Tindell, CTO of Canis Automotive Labs, described how attackers manipulated an electronic control unit (ECU) in a <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/toyota-builds-open-source-car-hacking-tool\" target=\"_blank\" rel=\"noopener\">Toyota RAV4&#8217;s<\/a> headlight to gain access to its CAN bus, through which they were able to, ultimately, steal the vehicle. That&#8217;s an approach that hasn&#8217;t been seen before. Once connected via the headlight, they hacked their way into the CAN bus \u2014 responsible for functions like the parking brakes, headlights, and smart key \u2014 through a gateway and then into the powertrain panel, wherein lies the engine control.<\/p>\n<figure>\n<picture><source type=\"image\/webp\" media=\"(max-width: 576px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=480&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(max-width: 767px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(min-width: 768px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/jpeg\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=jpg&amp;disable=upscale\"><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" alt=\"Diagram showing how ECUs in a RAV4 are wired together with CAN bus\">\n<\/picture><figcaption>How ECUs in a RAV4 are wired together with CAN bus. Source: Canis CTO blog<\/figcaption><\/figure>\n<p>This type of CAN injection will require manufacturers to rethink control network security in their vehicles, he warns.<\/p>\n<p>&#8220;When you&#8217;re a car engineer,&#8221; Tindell tells Dark Reading, &#8220;you&#8217;re trying to solve all sorts of problems: minimizing the wiring, reliability, cost. You&#8217;re not thinking &#8216;cyber, cyber, cyber&#8217; all the time.&#8221;<\/p>\n<p>&#8220;We&#8217;re not wired that way,&#8221; he says. &#8220;Forgive the pun.&#8221;<\/p>\n<h2 class=\"regular-text\">Cyber Theft Auto<\/h2>\n<p>On April 24 last year, Ian Tabor woke up to find that his Toyota RAV4&#8217;s front bumper and left headlight had been manhandled, while it was parked out on the street in London.<\/p>\n<blockquote class=\"twitter-tweet\" readability=\"9.7319884726225\">\n<p lang=\"en\" dir=\"ltr\">No fcuking point having a nice car these days, came out early to find the front bumper and arch trim pulled off and even worse the headlight wiring plug had been yanked out, if definitely wasn&#8217;t an accident, kerb side and massive screwdriver mark. Breaks in the clips etc. C&amp;&amp;#;ts <a href=\"https:\/\/t.co\/7JaF6blWq9\" target=\"_self\" rel=\"noopener\">pic.twitter.com\/7JaF6blWq9<\/a><\/p>\n<p>\u2014 Ian Tabor (@mintynet) <a href=\"https:\/\/twitter.com\/mintynet\/status\/1518274535035965440?ref_src=twsrc%5Etfw\" target=\"_self\" rel=\"noopener\">April 24, 2022<\/a><\/p><\/blockquote>\n<p>One month later, those same areas of the car were again obviously tampered with. Tabor didn&#8217;t realize the full scope of the sabotage until it was too late.<\/p>\n<p>One day, the vehicle was gone.<\/p>\n<blockquote class=\"twitter-tweet\" readability=\"5.3244680851064\">\n<p lang=\"en\" dir=\"ltr\">I know what they were doing, the car is gone! My <a href=\"https:\/\/twitter.com\/ToyotaUK?ref_src=twsrc%5Etfw\" target=\"_self\" rel=\"noopener\">@ToyotaUK<\/a> app shows it&#8217;s in motion. I only filled the tank last night. FCUK! <a href=\"https:\/\/t.co\/SWl8PcmfZJ\" target=\"_self\" rel=\"noopener\">https:\/\/t.co\/SWl8PcmfZJ<\/a><\/p>\n<p>\u2014 Ian Tabor (@mintynet) <a href=\"https:\/\/twitter.com\/mintynet\/status\/1549955820166778881?ref_src=twsrc%5Etfw\" target=\"_self\" rel=\"noopener\">July 21, 2022<\/a><\/p><\/blockquote>\n<p>Tabor, it should be noted, is an automotive security consultant. The irony was not lost on Tabor&#8217;s friend, Tindell. &#8220;When I first read his tweet, I thought: Someone&#8217;s making a point,&#8221; he says. &#8220;But no, not at all.&#8221;<\/p>\n<p>Tindell, it turned out, was in a unique position to help. He&#8217;d helped develop the first CAN-based platform for Volvo vehicles \u2014 an experience applicable to the situation given that the CAN proved to be the RAV4&#8217;s key weakness.<\/p>\n<h2 class=\"regular-text\">How Hackers Typically Steal Cars<\/h2>\n<p>To break into a modern vehicle, the key is usually \u2026 the key.<\/p>\n<p>&#8220;The car is defended with the key,&#8221; Tindell explains. &#8220;The wireless key is a perimeter defense. It talks to an engine control unit (ECU), which asks: &#8216;Are you the real key?&#8217; The key responds: &#8216;Yeah.&#8217; Then the message goes to the engine immobilizer: &#8216;OK, the owner&#8217;s here with the key.'&#8221;<\/p>\n<p>To breach this line of communication, thieves have historically opted for so-called &#8220;relay attacks.&#8221; Using a handheld radio relay station, attackers can beam a car&#8217;s authentication request to its associated smart key, presumably lying in a nearby home. The key responds, and the car accepts the message because it is, in the end, valid.<\/p>\n<p>Attuned to this, manufacturers now commonly design keys to go to sleep after a few minutes of inaction. Owners with keys that don&#8217;t go to sleep can store them inside of a radio-impenetrable metal box<\/p>\n<p>Other attack types include subverting mobile apps, and making use of flaws in the infotainment systems of cars \u2014 the latter of which became a lightning rod for reform after the famed <a href=\"https:\/\/www.darkreading.com\/risk\/jeep-hack-0day-an-exposed-port\" target=\"_blank\" rel=\"noopener\">hack of the 2014 Jeep Cherokee by Charlie Miller and Chris Valasek<\/a> in 2015. In that case, the discovery of a wide open cellular communications port 6667 ultimately led to their ability to control the Jeep&#8217;s steering, braking, high beams, turn signals, windshield wipers and fluid, and door locks, as well as reset the speedometer and tachometer, kill the engine, and disengage the transmission so the accelerator pedal failed.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/cybercriminals-can-steal-your-car-novel-iot-hack\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your family&#8217;s SUV could be gone in the night thanks to a headlight crack and hack attack.Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/cybercriminals-can-steal-your-car-novel-iot-hack\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51383","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercriminals &#039;CAN&#039; Steal Your Car, Using Novel IoT Hack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals &#039;CAN&#039; Steal Your Car, Using Novel IoT Hack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T13:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cybercriminals &#8216;CAN&#8217; Steal Your Car, Using Novel IoT Hack\",\"datePublished\":\"2023-04-07T13:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/\"},\"wordCount\":778,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4b3a359b2daaf7f1\\\/64300a3863e3be106cd07dbb\\\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/\",\"name\":\"Cybercriminals 'CAN' Steal Your Car, Using Novel IoT Hack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4b3a359b2daaf7f1\\\/64300a3863e3be106cd07dbb\\\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"datePublished\":\"2023-04-07T13:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4b3a359b2daaf7f1\\\/64300a3863e3be106cd07dbb\\\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4b3a359b2daaf7f1\\\/64300a3863e3be106cd07dbb\\\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybercriminals-can-steal-your-car-using-novel-iot-hack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminals &#8216;CAN&#8217; Steal Your Car, Using Novel IoT Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals 'CAN' Steal Your Car, Using Novel IoT Hack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/","og_locale":"en_US","og_type":"article","og_title":"Cybercriminals 'CAN' Steal Your Car, Using Novel IoT Hack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-07T13:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cybercriminals &#8216;CAN&#8217; Steal Your Car, Using Novel IoT Hack","datePublished":"2023-04-07T13:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/"},"wordCount":778,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/","url":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/","name":"Cybercriminals 'CAN' Steal Your Car, Using Novel IoT Hack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","datePublished":"2023-04-07T13:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4b3a359b2daaf7f1\/64300a3863e3be106cd07dbb\/CANdiagram.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cybercriminals-can-steal-your-car-using-novel-iot-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybercriminals &#8216;CAN&#8217; Steal Your Car, Using Novel IoT Hack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51383"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51383\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}