A new custom firmware for the popular Flipper Zero multi-tool device is reportedly capable of bypassing the advanced rolling code security systems used in most modern vehicles, potentially exposing millions of cars to theft. Demonstrations indicate that this "DarkWeb" firmware can clone a vehicle's key fob functionality with just a single, brief signal capture, rendering the original key fob inoperable.
This development was highlighted by the YouTube channel "Talking Sasquach," which showcased the firmware's alarming capabilities. According to the demonstrations, an attacker needs only to be within range to capture a single button press from a target's key fob. This single capture then allows the Flipper Zero to emulate all key fob functions, including locking, unlocking, and trunk release. A significant consequence of this attack is that the original, legitimate key fob is immediately desynchronized and ceases to function.
Security experts suggest the firmware exploits vulnerabilities in the rolling code algorithms, either through reverse engineering of sequence leaks or by leveraging a "RollBack" attack methodology. This differs from older "RollJam" attacks, which required jamming the original signal and capturing a second one. The simplicity of this new method, requiring only one intercepted signal without jamming, makes it a more accessible and dangerous threat.
Vehicles from numerous major manufacturers are reportedly vulnerable, including Chrysler, Dodge, Fiat, Ford, Hyundai, Jeep, Kia, Mitsubishi, and Subaru. Some reports also mention Honda, Suzuki, Alfa Romeo, Ferrari, and Maserati. This broad impact suggests fundamental weaknesses in widely adopted rolling code implementations across the automotive industry.
While the Flipper Zero device itself is designed for legitimate security research and ethical hacking, this custom firmware has raised significant concerns. The Flipper Zero development team, however, has refuted claims that their device makes it easy to steal cars. In a blog post, they stated that the custom firmware uses a known technique documented in 2006 and that to actually start and steal a car, additional relay tools are required beyond just the Flipper Zero.
Industry experts warn that there are currently no simple software patches or user-implementable fixes for this vulnerability. Addressing this security flaw may require extensive hardware modifications or even mass vehicle recalls, posing significant logistical and financial challenges for manufacturers. For vehicle owners, vigilance and considering additional physical security measures are advised.