Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands

Posted on August 8, 2025August 8, 2025 By CWS

A brand new and customized firmware for the favored Flipper Zero multi-tool machine is reportedly able to bypassing the rolling code safety techniques utilized in most fashionable automobiles, doubtlessly placing thousands and thousands of automobiles prone to theft.

Demonstrations by the YouTube channel “Speaking Sasquach” reveal that the firmware, stated to be circulating on the darkish internet, can clone a car’s keyfob with only a single, transient sign seize.

Rolling code safety, the trade customary for car keyless entry for many years, was designed to forestall so-called “replay assaults.” The system works through the use of a synchronized algorithm between the keyfob (transmitter) and the car (receiver).

Every time a button is pressed, a brand new, distinctive, and unpredictable code is generated. An previous code, as soon as used, is rejected by the car, rendering easy sign recording and re-broadcasting ineffective.

Beforehand identified assaults on this method, corresponding to “RollJam,” have been technically advanced and tough to execute in the true world. RollJam required jamming the car’s receiver to forestall it from getting the primary sign from the reliable keyfob, whereas concurrently recording that unused code for later use.

This new exploit, nonetheless, is much extra harmful as a result of its simplicity. Based on the demonstrations, an attacker utilizing a Flipper Zero geared up with this tradition firmware wants solely to be inside vary to seize a single button press from the goal’s keyfob, for example, because the proprietor locks or unlocks their automobile. No jamming is required.

From that one captured sign, the machine can apparently reverse-engineer the cryptographic sequence, permitting it to emulate all keyfob capabilities, together with lock, unlock, and trunk launch, successfully making a grasp key.

A major consequence of this assault is that the unique, reliable keyfob is instantly desynchronized from the car and ceases to operate. This could possibly be the primary signal for an proprietor that their car’s safety has been compromised.

There look like two main theories on how the firmware achieves this. Speaking Sasquach suggests the tactic includes reverse engineering the rolling code sequence, which can have been made doable by prior leaks of producer algorithms or intensive brute-force assaults on identified code lists.

Nonetheless, different safety specialists level to a identified vulnerability detailed in an educational paper referred to as “RollBack.” This assault methodology includes capturing a number of codes after which replaying them to the car in a selected, manipulated order.

This methods the car’s synchronization counter into “rolling again” to a earlier state, which the attacker can then exploit to achieve management. Whatever the exact methodology, the end result proven in movies is similar: one seize grants full entry.

The checklist of affected producers is intensive and consists of many common manufacturers: Chrysler, Dodge, Fiat, Ford, Hyundai, Jeep, Kia, Mitsubishi, and Subaru.

For customers and producers, the implications are extreme. Because the vulnerability lies deep inside the car’s hardware-based receiver, there isn’t a simple repair like a easy software program replace.

Consultants warn that the one complete answer could be a mass recall to exchange the bodily parts in affected automobiles, a logistical and monetary nightmare for the automotive trade.

Equip your SOC with full entry to the newest menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Brands, Bypasses, Code, DarkWeb, Firmware, Flipper, Major, Rolling, Security, Vehicle

Post navigation

Previous Post: How to Secure Docker Containers
Next Post: CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday

Related Posts

UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device Cyber Security News
Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Cyber Security News
Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks Cyber Security News
Researchers Uncovered on How Russia Leverages Private Companies, Hacktivist to Strengthen Cyber Capabilities Cyber Security News
Russian Basketball Player Arrested over Alleged Ransomware Attack Claims Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday
  • Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands
  • How to Secure Docker Containers
  • Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday
  • Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands
  • How to Secure Docker Containers
  • Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News