Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands

Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands

Posted on August 8, 2025August 8, 2025 By CWS

A brand new and customized firmware for the favored Flipper Zero multi-tool machine is reportedly able to bypassing the rolling code safety techniques utilized in most fashionable automobiles, doubtlessly placing thousands and thousands of automobiles prone to theft.

Demonstrations by the YouTube channel “Speaking Sasquach” reveal that the firmware, stated to be circulating on the darkish internet, can clone a car’s keyfob with only a single, transient sign seize.

Rolling code safety, the trade customary for car keyless entry for many years, was designed to forestall so-called “replay assaults.” The system works through the use of a synchronized algorithm between the keyfob (transmitter) and the car (receiver).

Every time a button is pressed, a brand new, distinctive, and unpredictable code is generated. An previous code, as soon as used, is rejected by the car, rendering easy sign recording and re-broadcasting ineffective.

Beforehand identified assaults on this method, corresponding to “RollJam,” have been technically advanced and tough to execute in the true world. RollJam required jamming the car’s receiver to forestall it from getting the primary sign from the reliable keyfob, whereas concurrently recording that unused code for later use.

This new exploit, nonetheless, is much extra harmful as a result of its simplicity. Based on the demonstrations, an attacker utilizing a Flipper Zero geared up with this tradition firmware wants solely to be inside vary to seize a single button press from the goal’s keyfob, for example, because the proprietor locks or unlocks their automobile. No jamming is required.

From that one captured sign, the machine can apparently reverse-engineer the cryptographic sequence, permitting it to emulate all keyfob capabilities, together with lock, unlock, and trunk launch, successfully making a grasp key.

A major consequence of this assault is that the unique, reliable keyfob is instantly desynchronized from the car and ceases to operate. This could possibly be the primary signal for an proprietor that their car’s safety has been compromised.

There look like two main theories on how the firmware achieves this. Speaking Sasquach suggests the tactic includes reverse engineering the rolling code sequence, which can have been made doable by prior leaks of producer algorithms or intensive brute-force assaults on identified code lists.

Nonetheless, different safety specialists level to a identified vulnerability detailed in an educational paper referred to as “RollBack.” This assault methodology includes capturing a number of codes after which replaying them to the car in a selected, manipulated order.

This methods the car’s synchronization counter into “rolling again” to a earlier state, which the attacker can then exploit to achieve management. Whatever the exact methodology, the end result proven in movies is similar: one seize grants full entry.

The checklist of affected producers is intensive and consists of many common manufacturers: Chrysler, Dodge, Fiat, Ford, Hyundai, Jeep, Kia, Mitsubishi, and Subaru.

For customers and producers, the implications are extreme. Because the vulnerability lies deep inside the car’s hardware-based receiver, there isn’t a simple repair like a easy software program replace.

Consultants warn that the one complete answer could be a mass recall to exchange the bodily parts in affected automobiles, a logistical and monetary nightmare for the automotive trade.

Equip your SOC with full entry to the newest menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Brands, Bypasses, Code, DarkWeb, Firmware, Flipper, Major, Rolling, Security, Vehicle

Post navigation

Previous Post: How to Secure Docker Containers
Next Post: CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday

Related Posts

Google to Remove Two Certificate Authorities from Chrome Root Store Google to Remove Two Certificate Authorities from Chrome Root Store Cyber Security News
First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology Cyber Security News
Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host Cyber Security News
Microsoft 365 Outage Disrupts North American Admin Access Microsoft 365 Outage Disrupts North American Admin Access Cyber Security News
PornHub Breached by ShinyHunters Group and Premium Members Data Stolen PornHub Breached by ShinyHunters Group and Premium Members Data Stolen Cyber Security News
CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News