• Home
  • Vehicle Search
  • Vehicle Security
    • What Is Relay Car Theft ?
    • GHOST
    • META TRAK
  • Mobile Services
    • Performance Remapping
    • TCU (gearbox) Mapping
    • DPF & EGR Solutions
    • AdBlue Solutions
    • Diagnostics
    • Hardware Fitting
  • What is ECU Remapping ?
  • Reviews
  • Gallery
  • Contact Us
  • Discliamer
  • More
    • Home
    • Vehicle Search
    • Vehicle Security
      • What Is Relay Car Theft ?
      • GHOST
      • META TRAK
    • Mobile Services
      • Performance Remapping
      • TCU (gearbox) Mapping
      • DPF & EGR Solutions
      • AdBlue Solutions
      • Diagnostics
      • Hardware Fitting
    • What is ECU Remapping ?
    • Reviews
    • Gallery
    • Contact Us
    • Discliamer
  • Home
  • Vehicle Search
  • Vehicle Security
    • What Is Relay Car Theft ?
    • GHOST
    • META TRAK
  • Mobile Services
    • Performance Remapping
    • TCU (gearbox) Mapping
    • DPF & EGR Solutions
    • AdBlue Solutions
    • Diagnostics
    • Hardware Fitting
  • What is ECU Remapping ?
  • Reviews
  • Gallery
  • Contact Us
  • Discliamer

WHAT IS RELAY CAR THEFT ?

SOPHISTICATED CAR THEFT

Many new cars now have keyless entry systems, or can have them added as an upgrade. This allows the driver to open and start the car without using a button or turning a key so long as the fob is nearby.


Thieves are exploiting this, using sophisticated technology to hack into your car’s computer, meaning they don’t even need a key-fob to start the vehicle and can drive it away in a matter of minutes.


 

In fact, 96% of motorists are at risk of having their car stolen by criminals using the latest theft technique, according to figures from security company Tracker.

The most at-risk are cars that use keyless fobs, as well as ‘connected cars’. In other words those that use internet to access maps, travel info and music – basically anything with an internet-enabled infotainment system.

How does a relay attack work?

A relay attack usually involves two people working together. One stands by the targeted vehicle, while the other stands near the house with a device that can pick up a signal from the key fob. What’s more, some devices can pick up a signal from over 100 metres away.

The device then relays the key fob’s signal directly to the car, allowing the thieves to get in and drive away immediately. According to the Daily Mail, these hacking devices can be bought for as little as £100 by thieves online.


Testing out devices available from Amazon and eBay, the Mail managed to break in to and ‘hack’ a Ford Fiesta in less than two minutes. In another test, Germany’s ADAC discovered that some brands are more at risk than others, with BMW and Peugeot systems being particularly easy to hack.

 

But ADAC also managed to unlock a Toyota Prius, Ford Focus and Volkswagen Golf, showing that no one particular manufacturer is immune to this new kind of crime. The video above shows examples of thieves employing the ‘relay’ technique.


Andy Barrs, head of police liaison at security firm Tracker, said: “As relay attacks become even more prevalent, owners need to protect themselves, particularly since criminal gangs are routinely using relay devices to exploit weaknesses in keyless security systems across a broad range of manufacturers.


“These tools are readily available on the internet for as little as £80 and thefts typically occur in residential areas, where cars are parked relatively close to the house, especially at night.


“It’s worth remembering that technology is just one part of vehicle security and more vigilance needs to be taken across the board; this includes car owners, manufacturers, dealers, insurers and the police.”


  • Install a ‘ghost immobiliser’: For another layer of protection, add a secondary barrier to your car’s factory fitted immobiliser by having a unique access code to start your car.
  • Invest in a tracking device: A tracking device won’t stop your vehicle being stolen, but it significantly increases chances of police recovering and returning it.


“It’s clear from our survey that many people are unintentionally leaving themselves vulnerable to these kinds of attack, by putting their keys in easy reach of  relay devices”, concluded Barrs.


  • Privacy Policy

Mtune Remapping

     Copyright © 2022 Mtune Remapping - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept