How to Steal a Tesla with a $500 Hacking Tool

Tesla is having a bad month. Shortly after founder Elon Musk smoked marijuana on video during Joe Rogan's podcast, two senior executives left the company, which was followed by a six percent drop in its share price. Musk later tweeted about Tesla canceling two color options for its vehicles to "simplify manufacturing" -- an increasingly contentious problem as Tesla continually fails to deliver cars on time.

Credit: Tesla

(Image credit: Tesla)

Now there's even more bad news: Belgian researchers have discovered serious vulnerabilities in the Passive Keyless Entry and Start (PKES) system used by the Tesla Model S. With $500 of equipment, you can unlock and steal a Model S, and the problem hasn't yet been fixed.

MORE: Watch How Easy It Is to Hack a Keyless Car

The Computer Security and Industrial Cryptography (COSIC) research group at the Catholic University of Leuven said the problem likely isn't limited to vehicles made by Tesla.

It discovered the vulnerabilities in a PKES system made by a company named Pektron, so even though it's only confirmed that its attack works on the Model S, odds are good that vehicles from other manufacturers that use Pektron's systems are also vulnerable to compromise. (It probably isn't particularly easy to convince auto companies to lend you a car so you can publicly expose critical vulnerabilities in their systems.)

COSIC explained: "According to the Federal Communication Commission (FCC) equipment authorization database, Pektron also designed keyless entry solutions for manufacturers such as McLaren, Karma and Triumph. The internal pictures included in the FCC database show that all these systems use the same Texas Instruments TMS37F128 chip. This leads us to believe that the attack described here also affects the other manufacturers."

How It Works

At its most basic level, the attack itself allows someone to clone a key fob. COSIC examined how the key fob communicates with the vehicle, designed a Time-Memory Trade-Off (TMTO) attack, then used it to gain access to the vehicle.

Once that was done, the researchers found a practical way to compromise a vehicle using this PKES system with a Raspberry Pi 3 Model B+ paired to a smartphone's hotspot so it could access a 6TB drive with the TMTO tables, Proxmark3, Yard Stick One and a USB battery pack.

None of that equipment is particularly expensive. The Raspberry Pi 3 Model B+ costs around $35, the Yard Stick One is about $100, the Proxmark3 RDV4 kit is roughly $300 and compatible USB battery packs and storage will vary by model.

Sure, that means the researchers spent more than $435 on this attack, but what does that matter when it offers access to a car that starts at $77,000 and has notorious manufacturing delays? Of course, finding a way to actually keep the Model S without getting caught would be a problem for the criminals to figure out. 

You can see the attack in action in COSIC's proof-of-concept video:

YouTube YouTube
Watch On

A Months-Old Problem

COSIC said it disclosed these vulnerabilities to Tesla in August 2017. A few months later, it contacted the company that makes the PKES system, Pektron, directly. It also reached out to several Pektron customers, including McLaren, Karma and Triumph. None have responded to COSIC's disclosure.

So it conducted a live demonstration of the attack on one of Tesla's engineering vehicles in April, presented its findings at CHES 2018 in Amsterdam on Sept. 10 and has submitted a full research paper that is "currently under submission and will be released in the future."

We've reached out to Tesla to verify COSIC's claim of revealing these vulnerabilities in August 2017, determine if the company's other vehicles are susceptible to the same attack and see how Tesla plans to address the issue. We'll update this post if the company responds.

This story originally ran on Tom's Hardware.

Tom's Guide Staff

Tom's Guide upgrades your life by helping you decide what products to buy, finding the best deals and showing you how to get the most out of them and solving problems as they arise. Tom's Guide is here to help you accomplish your goals, find great products without the hassle, get the best deals, discover things others don’t want you to know and save time when problems arise. Visit the About Tom's Guide page for more information and to find out how we test products.

Read more
Find My iPhone
Apple Find My hack turns any Bluetooth device into a secret AirTag — what we know
Eight Sleep Pod 4 Ultra with head raised in beige bedroom
Eight Sleep smart beds reportedly have a secret backdoor that can be accessed remotely — everything you need to know
iPhone with USB-C charging cable
Apple’s proprietary USB-C controller has officially been hacked – what you need to know
Cars on the road with blue overlay indicating what data may be contained about the drivers within
Millions at risk due to severe security flaw in license plate readers
A hacker typing on a computer
FBI issues serious warning to iPhone and Android users — stop doing this ASAP
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
Latest in EVs
2025 Mini Cooper Countryman SE All4 review.
I drove the Mini Cooper Countryman EV for a week — and it’s the most thrilling ride I’ve tested this year
2025 Nissan Ariya Platinum+ AWD review.
I drove the Nissan Ariya EV for a week — and it's nearly the perfect crossover
Composite image of Lucid Air Pure, Rivian R1T and Kia EV9
I've driven over 30 electric cars in the last year — and these are the coolest features that really stand out for me
2025 Chevrolet Silverado EV test drive.
I drove the Chevrolet Silverado EV for a week — here’s my pros and cons
2025 Hyundai Santa Cruz Limited review.
I drove the Hyundai Santa Cruz for a week — here’s my pros and cons
2025 Hyundai Tucson Hybrid Limited review.
I drove the Hyundai Tucson Hybrid for a week — here's my pros and cons
Latest in News
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
NYTimes Connections
NYT Connections today hints and answers — Saturday, March 23 (#651)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #385 (Sunday, March 23 2025)
Nintendo Switch 2
Nintendo Switch 2 rumored specs — here’s what we know so far
iPhone 17 Pro render
iPhone 17 Pro — 7 biggest rumored upgrades
CAD renderings of the Google Pixel 10 Pro XL
Pixel 10 leak could be good news for all Android phones