
A new, custom firmware circulating on the dark web for the popular Flipper Zero multi-tool device is reportedly capable of bypassing the advanced rolling code security systems used in most modern vehicles, placing millions of cars at significant risk of theft. This development represents a substantial escalation in vehicle security threats due to the exploit's simplicity compared to previous methods.
Demonstrations by the YouTube channel "Talking Sasquach" highlight the alarming capabilities of this firmware, which can clone a vehicle's key fob with just a single, brief signal capture. Unlike older, more complex attacks like "RollJam," this new exploit does not require jamming the vehicle's receiver. An attacker needs only to be within range to intercept one button press from a target's key fob, such as when an owner locks or unlocks their car.
Rolling code security has long been the industry standard for keyless vehicle entry, designed to prevent "replay attacks" by generating a new, unique code with each button press. The Flipper Zero's "DarkWeb" firmware reportedly circumvents this by either reverse-engineering the cryptographic sequence or exploiting a "RollBack" vulnerability. This allows the device to emulate all key fob functions, effectively creating a master key, and often desynchronizing the original key fob.
The list of affected manufacturers is extensive, including major brands such as Chrysler, Dodge, Fiat, Ford, Hyundai, Jeep, Kia, Mitsubishi, and Subaru. The vulnerability lies deep within the vehicle's hardware-based receiver, meaning a simple software update is unlikely to provide a comprehensive fix. Security experts warn that the only effective remedy might involve a mass recall to replace physical components, posing a logistical and financial challenge for the automotive industry.
Vehicle owners are advised to be vigilant, paying close attention to whether their car successfully locks on the first attempt, as a failed lock could indicate signal jamming. Manufacturers face increasing pressure to enhance security protocols, potentially integrating cryptographic upgrades or over-the-air updates, to counter this evolving threat to automotive security.