Simple Gadget to steal your vehicle

teamzr1

Supporting vendor
Amazon has banned the sale of the 'FlipperZero' gadget, a handheld device designed to hack into digital frequencies such as radio waves and TV signals.
First released in the summer of 2020, the tool took off this year as it fueled a TikTok prank wave.
The online retail giant decided to ban the product after it became clear its hacking abilities are also able to clone credit card information, breaking the company's rules on card-skimming.

And in a disturbing look at how easily public digital waves are intercepted, social media has become flooded with pranksters switching off restaurant screens, opening card-locked doors and meddling with vehicles.

While often used for social media pranks, the tool has more nefarious uses, including the ability to intercept a remote car key signal
The tech is also able to open doors locked through a key card, as it can read and remember digital frequency information for later use
The FlipperZero device, which was retailing for $169, is not solely designed for tricking unsuspecting victims, and its use will remind some of the retro 'Tamagotchi' games.

Users play with a digital pet dolphin that they 'feed' by hacking into frequencies, which is done through an electronic multi-tool that can hack into a feed at the click of a button.
In videos shared across social media, students have been seen using it to disrupt classes by turning off smart boards and annoying their friends by shutting down screens when they are in a live video game.

In another, a user was able to hack into the digital wallpaper in a restaurant and menu screens in a fast-food chain.
Built through a crowdfunding campaign that raised almost $5 million three years ago, Flipper Zero hardly shies away from its capabilities, with its website noting that the toy 'loves hacking digital stuff, such as radio protocols, access control systems, hardware and more.'

Many have used the gadget to frustrate those around them through harmless pranks, like turning off a video game or switching the channel on a TV inside a business.
However, the tool also appears to have more nefarious uses, including using its sub-1 GHz radio feature to mimic the signals on a car's key remote control to unlock it.
The tool has a similarly contemptible option for financial frauds, as it is able to scan and remember credit card information - including through your smartphone.
To be able to hack into a credit card, the device must be held over the card directly, and it does not appear to be able to gain access through a wallet.

Similarly, the FlipperZero is able to steal card information over smartphone features such as Apple Pay, however the phone needs to be unlocked for it to do so.
In clips of the device causing havoc on the streets shared to social media, some users appear to use it to intercept wireless signals controlling traffic barriers.

This same wireless signal interception would reportedly also allow the tool to change signs at a gas station and intercept overhead announcements at supermarkets.
Hotels that use RFID cards for their hotel rooms, which is most that allow you to tap to unlock a door, may also be wary of the tech as it can open a card-locked door.
Thanks to its ability to read and then save an RFID card wave, all a hacker would need to do is read a hotel room key for a few seconds with a FlipperZero to then gain access to the room.

While many appear to have played essentially harmless pranks with the gadget, its card-skimming ability has seen it banned from Amazon.
The retailer has specific policies to prevent 'credit card skimmer' technology being available on its platform, with the FlipperZero machine's tap-to-pay card reader determined to have breached the rules.

According to Bleeping Computer, Amazon sent a warning to third party sellers to stop selling the technology in a notice.
'This product has been identified as a card skimming device.
Amazon policy prohibits the sale or listing of card skimming devices,' the notice reportedly read.
'We took this action because this product is not permitted for sale on Amazon.com. It is your obligation to make sure the products you offer comply with all applicable laws, regulations, and Amazon's policies.'

flipper.jpg
 

antijam

CCCUK Member
Still currently available from Amazon UK - in fact I can have it delivered today if I order in the next few hours.
Never trust anything with electronics in it - that's another advantage of 'Classic' cars.....:)

(My signature was spoken by a guy who had a really bad experience ;))
 
Last edited:

teamzr1

Supporting vendor
Finally gets to the federal level as GM still has not prevented easy ways to steal Corvettes

June 22, 2025 — A General Motors class action lawsuit alleges several models can be stolen after the keyless entry systems and key fobs are hacked and intercepted.

The GM keyless entry class action includes most 2010 to present vehicles including
  • Chevrolet Tahoe
  • Chevrolet Suburban
  • Chevrolet Silverado
  • GMC Yukon
  • GMC Yukon XL
  • GMC Sierra
  • Cadillac Escalade
  • Cadillac Escalade ESV
  • Corvette
According to the lawsuit, tens of thousands of those vehicles are defective because criminals can hack and clone the keyless entry systems and key fobs.

The lawsuit quotes GM by saying the Keyless Open and Keyless Start can:

“[L]ock and unlock doors, access the liftgate or trunk, and start your vehicle without removing your key fob from your pocket or bag, as long as it’s within range. When you approach the vehicle with the key fob within a three-foot range of the door, pressing the button on the driver’s door handle once will unlock the driver’s door; pressing it again within five seconds will unlock all doors.”

GM Key Fob Hacking Lawsuit — The Plaintiff

The GM keyless entry lawsuit was filed by Texas plaintiff Jeremy Burkett who purchased a used 2016 GMC Sierra 1500 in April 2017, and he was provided two keyless entry remotes. During the early morning hours of November 9, 2022, his 2016 GMC Sierra 1500 was stolen from his driveway, causing him to file an insurance claim and police report.

The plaintiff believes an unknown thief was able to hold up a cloning device to the front door (close to where his keys were typically stored) to transmit the key fob’s signal to a cloning device. The plaintiff complains this was done to trick his truck into thinking the authentic key fob was nearby.

The plaintiff believes this was how the truck was stolen because no windows were broken and the vehicle alarm wasn't activated. The class action alleges the plaintiff never recovered his GMC Sierra 1500, but he was compensated by his insurance company for the total loss.

The plaintiff says he purchased a new 2023 GMC Sierra 1500 in May 2023 and equipped with a push start ignition system and keyless entry. The plaintiff claims his new vehicle is also defective due to the keyless entry system, but the lawsuit doesn't explain why he purchased a truck he believes is just as defective as his previous truck.

And he complains he "constantly worries about theft."

"He wonders every time he parks if it is a safe place or if he should look for some place safer. He does not feel comfortable keeping a USB cord in his new vehicle. Finally, when his car was stolen things were missing that had his address on it. This caused him stress and anxiety as he does not know who might have his address, and he worries if he is safe at home now." — GM class action lawsuit

GM Keyless Entry Class Action Lawsuit

The GM keyless entry lawsuit alleges the key fobs can be hacked when a cloning device intercepts the wireless signal. Once the cloning device has the intercepted information, a vehicle can be unlocked and stolen without triggering the alarm system.

The class action lawsuit also alleges the vehicles contain defective OBDII ports that make the vehicles "a favorite of thieves across the country who can steal the car in under a few minutes. Thieves can easily access the OBDII port and connect a handheld device purchased online to tap into the car’s computer system, program a new key fob, and drive off."

General Motors allegedly has done nothing to prevent harm to customers even though the automaker has supposedly long known criminals can illegally clone the key fobs and keyless entry systems. And the lawsuit blames GM for when a thief steals a vehicle and drives recklessly after the theft.

Claiming GM conducts deceptive and fraudulent business practices, vehicle owners have allegedly suffered "an ascertainable loss of money and/or property in the form of, for example, loss of value, loss of use of the vehicles, repair costs, insurance deductible costs, higher insurance premiums, lost time, and other inconvenience and anguish."

Similar to lawsuits filed against Hyundai and Kia regarding teenage criminals stealing vehicles, this General Motors keyless entry lawsuit places the blame on GM, not the criminals breaking laws.

The GM keyless entry and key fob class action lawsuit was filed in the U.S. District Court for the Eastern District of Texas (Sherman Division): Jeremy Burkett v. General Motors Company, et al.

The plaintiff is represented by Steckler Wayne & Love PLLC, Carter Arnett PLLC, and Dortch Lindstrom Livingston Law Group.
 
Top