https://arstechnica.com/information...y-unknown-keyless-can-injection-attacks/sample quote #1
The CAN-Bus- injector Tabor bought was disguised as a Bluetooth JBL speaker.
That gives thieves cover in the event police or others become suspicious. Instead of carrying an obvious hacking device, the crook appears to possess an innocuous speaker.
end quote
sample quote #2
The research uncovered a form of keyless vehicle theft neither researcher had seen before. In the past, thieves found success using what’s known as a relay attack. These hacks amplify the signal between the car and the keyless entry fob used to unlock and start it. Keyless fobs typically only communicate over distances of a few feet. By placing a simple handheld radio device near the vehicle, thieves amplify the normally faint message that cars send. With enough amplification, the messages reach the nearby home or office where the key fob is located. When the fob responds with the cryptographic message that unlocks and starts the vehicle, the crook's repeater relays it to the car. With that, the crook drives off.
“Now that people know how a relay attack works … car owners keep their keys in a metal box (blocking the radio message from the car) and some car makers now supply keys that go to sleep if motionless for a few minutes (and so won’t receive the radio message from the car),” Tindell wrote in a recent post. “Faced with this defeat but being unwilling to give up a lucrative activity, thieves moved to a new way around the security: bypassing the entire smart key system. They do this with a new attack: CAN Injection.”
end quote
Do Stellantis products have Electronic Control Units at headlights/tailights/rear cameras etc?