Evgenia Grugov's workshop - car hijacking methods. How to protect the car from the hijacking: mechanical and electronic methods of protection, advice of professionals where buy equipment for hijacking machines

Protection of the beloved car from attacker's encroachments is a serious, subtle, responsible. About all the intricacies of the process we were told by the specialists from AutoSecurity.

1 Hijacking methods
2 The most hijacked cars in Russia
3 How to reduce the likelihood of hijacking
4 Mechanical anti-theft
5 Alarms and others electronic devices
6 Author's hijacking protection

Hijacking methods

To date, there are plenty of them - it may be hijacking by louseing the driver from the cabin already installed auto, the substitution of standard blocks, starting the engine or record the keys through the diagnostic connector using special equipment, hijacking using a tow truck.

The most popular method of hijacking is at the moment there is a regular key relay (hijacking using "Fishing Fishing" or "Long Hand"), but it is relevant only for cars with standard incinual access. The essence is that with the help of the so-called, the repeater, the signal of the regular key is repeatedly enhanced and transmitted to long distances, the car "sees" the regular key (as if the car owner approached the car with the key) and opens the central lock and allows the engine to start the engine. When the hijacker leaves for the car, the indication appears on the instrument panel that the key is not found, but the engine is not blocked (none of any brand and model) - is done for the purpose of security, for example, do not cause emergency situation On the road, for example, when the child played with the key and threw it out of the window on the go. The next time the car will "require" the key only when the engine is restarted.

As for thefts with the use of so-called, "stocking", then it is also relevant for each car, because Most of the car can not be launched without a key. A clear trend is traced here - if there are solutions in terms of a particular car incinual bypass staffing immobilizer (For autorun), then the equipment for the hijacking is most likely already on the "black" market.

Also there are some models of cars in which the staffing system can be bypass by replacing the engine control unit and the block that is responsible for certifying standard keys. The hijacker brings with them blocks with a key in advance to the key and produces block substitution. After that, the start of the engine occurs unhindered.

The most hijacked cars in Russia

For the past, 2017 almost 22 thousand cars were kidnapped, the data of the Ministry of Internal Affairs of the Russian Federation.

The most "sought-after" was the Lada models - almost 6 thousand cars are grieved. Toyota comes in second place with a result of 3797 copies, followed by Hyundai (2056 cars). Also in Top-5, Kia entered (1890 cars) and Nissan (1197 pieces).

According to the hijacking, the first place by theft among foreign cars is held for several years in a row Hyundai Solaris..

Consolidated data on the 20th inepent, foreign cars are presented in the table:

Brand and car model

The number of hijacking in Russia in 2017

Toyota. Land Cruiser. 200

Mitsubishi Lancer.

Toyota Land Cruiser Prado.

How to reduce the likelihood of hijacking

Obviously, it is possible to counteract the stealing of the car using security tools or a set of funds. It is not worth hoping for regular security systems, even if you can catch the car only by complex and long-term manipulations. Additional anti-theft systems will help reduce the likelihood of hijacking, which are selected based on the operating conditions of the car and the wishes of the management owner, on feedback, according to the functionality. And always it must be a complex of devices, because One system, some kind of "tricky" and expensive, it was not capable of opposing the hijackers for a long time and effectively.

If we talk about intellectual hacking (using various scanners, grabbber code, etc.) of modern dialog systems, then you can go to it for several days. It is clear that the hijackers do not have the opportunity to spend so much time in the car, and even with powerful computing equipment. Therefore, hacking comes down to neutralize alerts (open the hood and tear off / break the siren, and also include "muffler" to block alerts on a key chain or phone), and then to the neutralization of locks. With the last just the most difficult, because The hood closed on additional locks makes the procedure for lesson and risky - it's easier to find the same car, but without additional security systems.

If we talk about an extensive anti-theft complex, which will include several locks and several frontiers of protection, including mechanical devices and booked glass, then such a hijacking can last several hours and still end the failure for the hijacker.

It should be understood that there is no such thing as "the most best alarm"Or" best immobilizer "- the equipment is always selected for specific conditions for the operation and storage of the car, and also takes into account the wishes of the owner of the functionality, on the control, on feedback, etc. If the" best "systems existed, and they were it would be equally good for any car and for any owner, then all this equipment would have been fixedly and there would be a flour of choice. But what can be said exactly - the security system should be at least resistant to intellectual hacking, and this modern models Pandora / Pandect, Autolis, Excellent, Prizrak, Starline, Stalker.

Mechanical anti-thefts

Castle on the hood

Mechanical security tools can be used as the components of the anti-theft complex, as well as as separate litters.

The hood locks are always installed only if there is a digital (wireless) lock under the hood, since their task is to close the attacker access to this very blocking. Such a scheme for building an anti-theft complex has been the most efficient and frequently used to protect the car from the hijacking. The essence of it is that the "swollen" system is created - the digital lock from the cabin is not turned off, and it is possible to eliminate it only by physically reaching the relay under the hood, and the hood is closed with additional electromechanical castle or castles. They, in turn, are managed by the same system as the engine blocks. It turns out that until the owner's authorization is passed, the blocking under the hood will be active and the hood will not open. There are currently universal hood locks to which there are various gains, and hood locks with brackets under specific brand and car model.

Rule blocker

It can serve as a supplement to the anti-theft complex, or be a separate and only line of car protection. Often blockers use owners budget cars. Steering shaft locks have a different degree of efficiency depending on the manufacturer and the blocking method. If you take into account the most popular Garant models (FLIM products), then they are a rather reliable anti-theft device, which is able to deliver a lot of problems to the attacker, and in most cases it is completely made to abandon the hijacking of a car equipped with such a lock. But the cooler of the steering shaft block is the presence of a human factor - the owner can be lazy or forget to establish it at the next parking lot and this time thieves will make an attack on the car.

Castle on the gearbox

Effective anti-theft device, but only if the lock blocks the gear shift mechanism directly under the hood. In practice, most devices block the gear selection itself in the car's cabin - for a professional hijacker, this lock will not be a problem, because It is enough to disassemble the central console and the drive to include the necessary transferAt the same time, the PPC handle remains blocked in the Parking position, and the Drive mode will actually turn on. If the hood is not protected by the lock, then the desired transmission on most modern cars can be included from under the hood - this is the second way to "bypass". But if the device blocks the switching mechanism under the hood, and in turn also closed by the lock, then such a scheme will be quite effective. Unfortunately, the rotational locks of the gearbox exist are far from all cars presented in the domestic car market.

Door blockers

Door (pin) blocks are a very effective border guard, but also quite expensive. The cost of installing 4-door devices and their switching to the security system is about 30-40 thousand rubles. Blocks are not independent anti-theft devices - They are controlled from the additionally installed security system (immobilizer or alarm). Equipped with them mostly expensive and risky in terms of hijacking cars. Together with the blockers, it is logical to book winds with a strengthening film - thus it is possible to drastically close access to the salon to intruders. And even if the glass is broken, "work" a hijacker with a car, which has the doors blocked - extremely inconvenient, since most manipulations are performed in the lying position (the door is open, the legs of the hijacker on the street, and the top of the body lies on the floor of the car) that With closed doors, it is simply impossible.

Blocking wheels and pedals

In AutoSecurity, they do not work with such systems and that is why they all block the wheels by creating pressure in the brake system of the car, and the intervention in the braking system, experts consider it a risky and fraught emergence of abnormal situations that may entail injuries or even the death of motion participants. With brake pedal blockers, the company also does not work.

Alarms and other electronic devices

All electronic anti-theft systems can be divided into 3 large groups:

  • Alarm. These are systems that are designed to notify the owner of the alarming events. It can be sound (siren), light (dimensions or rotary pointers), by key chain, for phone. Any alarm has the ability to lock the engine, but it is in the overwhelming majority of cases analog methods (controlled analog signal), so they are not able to resist the hijacker for a long time - it is enough to find a block of alarm in the cabin, to apply the pulse to the control wire, and it will turn off. It is not necessary to even look physically the blocking itself, so such devices are implemented in the cabin (blocking most often ignition or power of the benzone pump). But there are modern alarms that, in addition to the analog options, have a digital (wireless) blocking relay - these relays already make sense to be placed under the hood, and close the hood additional castles. Digital locking from the cabin does not turn off and the hijacker will need to physically search for a relay and delete it, and for this you need to penetrate into the bootable space, and for this you will have to break / saw the hood lock, and this is long and loudly - the car becomes uninteresting.
  • Satellite anti-theft systems (hereinafter referred to as ATP). In fact, it is alarms that notify not the owner of the car, but the operator, which is located in the Dispatch Center. For this, the subscription fee is charged. If the ATP does not have digital locks in its composition, and there is no possibility to dunk the system with such locking, then the protection against theft will be dubious, because Everything comes down to the alerts of you by the dispatcher and call a group of operational response (if this service is available at the satellite operator).

But the most popular security systems at the moment are alarms that have the immobilizer functionality and can be equipped with a GPS antenna to determine the current location. Thus, by setting such a system, the owner receives three devices at once in one case - it remains to add the hood locks with relevant strengthening and the base anti-theft complex will be obtained, which in the future it will be possible to retrieve additional stages of protection.

Author's protection against hijacking

Under the concept of "author's protection against hijacking" means a non-standard approach to the installation of anti-theft equipment, as well as its own developments in the field of Carsecurity. As practice shows, the competent and high-quality installation of anti-theft complexes, selected on the basis of the specific operating conditions of the vehicle, already makes the car uninteresting for intruders, even if there is nothing copyrighted in such an installation. Therefore, by and large, "author's protection against hijacking" is a marketing tool, i.e. A certain way to allocate yourself against the background of competitors.

This device is intended for special police departments and other special services that require imperceptible penetration into a car with various purposes. The "Wave" system works with cars in which a regular system of comfortable access "Keyless Go" or "Keyless Entry" is installed, the system also allows you to start the car engine.

Attention!!!
The device is not intended to commit unlawful actions!

Supported model range (for version 2)

  • BMW 1, 3, 5, 6, 7, X (E-series) for European and American (Test)
  • Nissan Tiana, Patrol, GTR ?? last generation For the European market
  • Infinity FX, QX last generation for the European market
  • Toyota LC200, RAV4, Highlander for the European and American Market
  • Lexus LX570, IS250 and similar to the European and American market

Note: The list of supported cars will expand. Perhaps a paid system update.

Main characteristics


  • Dimensions: 30 cm x 23 cm x 6 cm (s)
  • Working from the battery in standby mode up to 10 hours.
  • Battery charge time - 8 hours.
  • The weight of repeaters - 2 kg.

Radio Characteristics:

  • Applied QAM modulation
  • Dynamic spectrum expansion
  • Relay speed up to 600 cbv

Principle of operation

The "wave" system consists of two relay modules - the receiving and transmitting. The receiving module must be located at the car transmitting the key. After switching on the system between the modules, a high-speed digital data transmission channel is set, which allows you to relay car requests to the key and back.


To work the system, you must perform the following conditions:

  • The receiving module must be located in 30-50 centimeters from the door handle (an antenna is installed).
  • The transmitting module must be located in 1 - 5 meters from the key. Depends on the type of car and the status of the battery in the key.
  • The distance between repeaters in the area of \u200b\u200bthe direct visibility to 1 kilometer. Keep in mind!

If one of the relay modules is in the building, then due to the poor transmission of the radio signal, the distance can depend much. Urban buildings, metal structures and strong urban oscillance of the radio ester also reduce the working distance between the modules.

Working with BMW cars

Car must be equipped standard system Comfortable access. This can be determined by the presence of a roiber on the door handles as in the figure below.


Determine the car for which car is released, it can be understood on the instrument shield, it will be graded in miles, according to characteristic yellow reflectors on the front bumper (E70) or constantly included in the near light and so on.

Repeaters configuration for BMW mode:

  • Both modules are turned off.
  • Switch number 1 - enabled (BMW mode), all other configuration switches are turned off.
  • If the car is made for the US market, the switch number 8 (America) is additionally enabled.
  • After turning on the power of the modules, each module starts flashing the green LED. (ATTENTION! It is impossible to bring modules close to each other, the high power of the devices may damage the sensitive schemes of the receivers!)
  • When repeaters establish a connection between each other, the yellow LED will begin on each device [*]. This means that devices "see" each other and are in touch in power saving mode.
  • The receiving module is placed at the car transmitting the key.
  • It is necessary to make sure that the devices are in touch, otherwise you need to wait for yellow LEDs on both devices.
  • After touching the door handle, a comfortable access system will work and a key request will be prompted [**]. You can see how the red LED will begin in the tact on the repeater. The system will switch to the operating mode and on both repeaters a green LED will flash quickly.
  • The car will open, and you can start the engine.
  • In order to close the car, you must touch the ribbed surface on the door handle.

* - repeaters will not be able to establish communication at close range (up to 5 meters).
** - In order to prevent the discharge of the battery, after 16 minutes, the car "falls asleep" and will not respond to attempts to open it using the Keyless GO system. You can "wake up" the car by turning the door insert.

Nissan / Infinity.

The system only works with such keys.


The principle of operation is identical as to BMW.

Switch position:

  • All switches are turned off, only No. 2 is on.

Toyota / Lexus.

Position of configuration switches:

  • All switches are turned off, No. 3 is enabled. For the American market, switch number 8 should also be included.

Select bags to transfer repeaters.

Well suits the bag for transferring laptops. When buying a bag, make sure that it does not have a metal edge rib around the perimeter (this can be done with a magnet). In a bag with a metal edge rib, repeaters will not work!

Note: The use of additional radio equipment can affect the operation of repeaters.

How it works

Federal service of theft.net does not distribute this product. Material is purely informational.

For any owner of a car that can happen. But many motorists think that modern security car complexes reliably protect the car from criminals. But, unfortunately, it is not. In fact, it turns out that you can internally catch any car. And quite simple.


We pushed the article to write a case: a friend of the famous premium brand was hijacked by a familiar editorial officer. Moreover, it happened in broad daylight before the kindergarten, near which the "major" car was parked for only 5 minutes. The most amazing thing in the car besides the regular complex anti-theft system Additional alarm has been installed. How so? Are modern security automotive complexes are not able to protect the owners from the loss of property? Let's deal with.

Agree, it may be worse when your car hijacked in fact before your nose among the White Day. Yes, and for some more few minutes. Of course this is a daylight. After all, the owner spent a huge amount of money, which earned hard work, and now lost his source of joy, pride, etc. Fortunately, the owner of the "pathos" car not only established the second alarm, which turned out to be ineffective, but also acquired an expensive CASCO policy. So the money at least he did not lose. But, nevertheless, this case already suggests that modern hijackers improve their skills, and this allows them to quickly bypass complex car security systems.

Why do car hijacked? Especially premium? And how is the criminals so fast, still disconnect complex security systems?


The whole thing is in great demand for used spare parts. Especially in our time, when in recent years, the cost of new original spare parts actually doubled. As a result, the market for used spare parts is practically experiencing their second birth. And there are parts of premium cars here, the cost of which is comparable to gold jewelry.

As a result, people who own premium used cars are forced to either buy non-original spare parts dubious quality, or search for automotive components in the market for used spare parts. As a result, demand gives rise to a sentence. You understand that you can satisfy the demand for used cars only by importing used parts or disassembling cars who visited accidents in our country will not work.


But surprisingly we do not see the deficit of used parts in our country. Do you know why? The whole thing is, according to some data, about 50-60% used spare parts at the car market are criminal origin. In fact, in Russia there is a huge shadow market for used spare parts. As a rule, criminal used parts are sold on semi-legal disassembly and bases that actually buy crowded cars with criminals or parts of them. You understand that in this case the criminals are easier to find sales.

In addition, sometimes cars hijaculate to order, under the "Documents". Then the sophisticated car is converted to other people's documents and is sold, as a rule, to another region. But the truth is this kind of treatments today meets less frequently than theft of car for spare parts. Today, the increase in the cost of spare parts again revived the scope of the criminals. As a result, most often cars are hijacked under the "analysis".


In principle, the problem of theft is all over the world. Especially in the United States, where in recent years has been observed in the literal sense of "boom" to the hijacking of crossovers and SUVs. For example, according to statistics in the United States, cars are hijacked every 43 seconds. The leader of theft in the US is , Range Rover., RAM, Ford F-150 and others.

Also not all well and in many European countries, where the demand for hijackers use VW Golf, Passat and, as well as minivans.


In our country, despite some reduction in the number of car theft for several years, the number of hijacking is not small. The greatest demand for hijackers in Russia enjoy Hyundai Solaris, Kia Rio., Toyota Camry. and Corolla. Of premium marks In the leaders of thefts for several years there are: Mercedes G-Class, BMW 3-Series, Lexus RX, BMW 5-Series, Land Rover. Range Rover, Lexus LX, Mercedes E-Class, BMW X5, Infiniti FX / QX70.

Many, probably, are interested, how are these criminals in our days cares? After all, cars have become much perfect and technologies? How do attackers bypass modern security systems? Also, many of our readers will probably be interested, and is it possible to somehow protect your car by defending it from possible hijacking? You will find the answers below for these and other questions.

Hacking machine through the port of OBD II


The port is equipped with all cars manufactured since 1996. This diagnostic access port to a car computer, which is usually used to diagnose the car, in order to find a malfunction. For example, if on dashboard Any warning indicator lights up (for example, an error "engine check"), then using a special computer-scanner connected via the OBD port, you can read all errors in the electronic system of the car.

Also, by connecting special equipment through the diagnostic port, you can configure various functions in the car. Including in many cars using a special computer Programinstalled on a computer connected to the OBD port can be disabled statery alarm, unlock doors, etc. But the main thing is that using the hardware connected to the porto, you can and software simulate input to the ignition key native chipped key. In some cars using a computer, you can even "flash" a new one's key.


As a rule, OBD ports are easily accessible in all modern cars. In order to connect diagnostic equipment only a few seconds. Also on the Internet there are a lot of resources dedicated to the encryption of modern security automotive systemswhere you can find a lot detailed information About security staffing complexes. On some sites on the network (especially foreign), you can find even special programs and files for decryption of signaling codes of the security systems of many car brands.

There is also a network detailed instructionsthat are taught to hack modern cars, prescribing a foreign key in the system, allowing you to start the car engine.

As a result, the number of hijackers is growing all over the world. After all, modern electronic systems on the one hand are additionally protected by cars, and on the other hand, they simplified the task of hijackers. That is why today is not uncommon, when some professional hijackers can run the car engine in just 15 seconds.

With the increasing popularity of the remote identification of keys in which even economy-class cars are growing and the number of different services offered for sale to programming key chains. Naturally the greatest demand This equipment enjoys criminals specializing in theft of vehicles.

With the advent of remote key chains of the alarm, illegal equipment appeared on the market, allowing you to intercept the alarm radio signal, which allowed the hijackers to freely access the car.

Then there appeared key chains with floating, constantly changeable, signal. But almost immediately appeared in the world equipment to calculate the signal encoding sequence. As a result, even the most expensive automotive protection complexes have become defenseless before special electronic equipment of criminals, which using factory algorithms can not only intercept the key radio signal, but also calculate a number of consecutive digital codes during future pressing of the button on the native key chain.

Special concern cause contactless keychains, allowing you to automatically unlock the car without pressing the button on the key (Keyless GO).


In recent years, the "black market" has begun to offer equipment allowing to relay the signal of the contactless keychain. We have repeatedly wrote about this type of equipment for hacking the car. Most often, the attackers are used by the Rodel radio device, which allows the criminal while not far from the keychael (Keyless Go) of the car to enhance the radio signal transmitted in a constant mode to the device accomplice, which is located next to the machine.


As a result, the security system can be unlocked. Then the hijacker is enough to click the Stop / Start Engine Start button to hug the car. This means that a non-contact key that allows you to start a car from the button, continuously transmits a digital signal with a constant unchangeable code into the radio. As a result, using the "Futwork", the signal is relayed to another repeater located next to the car. Naturally, the car identifies the signal as a native, and removes the car with protection.

Hijacking video with "Fishing rods"

Also cars equipped with remote or non-contact radio key chains can be hacked using the same diagnostic port of OBD II. In this case, the task of the criminal to penetrate the car interior, connect the equipment to the OBD connector and prescribe a new remote key.

How will it protect the car from hacking through the OBD port or using the Roda repeater?


To maximize your car, you must close unhindered access to the OBD diagnostic port. For this exist special devicesClosing access to the port. Yes, of course, if the criminal sees that the OBD port is closed by the castle, he will not be difficult to break the castle.

But remember that it takes the time that plays on you. The fact is that the more time the hijacker will spend on the hijacking, the greater the chance that the hijacker will be detained by the police or more chances that your car will be left alone.

For example, professional hijackers prefer not to contact complex cars And most likely they will prefer to be returned by choosing a simpler car for theft.


You can also equip the car by a non-standard security system, which actually betrays even professional criminals. For example, you can install a hidden label in the cabin, only when activating which it will be possible to start the engine. In this case, you need to contact a specialized workshop where you will install an unusual alarm.

Usually, in order to confuse the hijackers, the specialists when installing an additional security complex based on hidden labels are embedded in part of the regular electrical wiring its cable loops of the same color. As a result, in order to deal with the electrical wiring hijacker may need too much time.


With regards to contactless access keys in the car, so that their signal is not relayed by intruders, you must isolate your keychain with foil or special covers that are devastating the key radio signal. This is especially useful when you are in the store, in the cinema or in any public place. We also do not recommend putting the keychain key in the hallway next to the door (or window), through which criminals can catch a keychain signal and relay it to the car.


So it's best if you buy a protective case or a special storage container contactless key (Keyless GO). For example, you can buy

Hand hacking car

More. Even those that are equipped with conventional alarms (including remote keychain keys). For example, in order to hurt old car The hijacker needs to get into the salon and open the hood to access the alarm unit and the source of the loud beep.

In principle, the attackers easily learned to open the doors of any machines with the help of various devices, ranging from special hooks, plates that are saturated between glass and seal, and ending with special knot screwdrivers that allow you to turn the larva in the car lock.


Naturally, getting access to the salon, if the car is equipped with a security system, it will immediately work loud sound signal. But since the criminal gained access to the cabin, he will not be difficult to open the hood and smash the sound source.

Next, the hijacker must start the engine. For this he turns steering wheel, breaking the blocking of the ignition lock, or with a screwdriver, turns the larch of the ignition lock. As a result, the car can be started using a turn.

But, as a rule, security alarms block the engine start, if you do not remove the machine with security. This is usually implemented using electrical wiring that feeds fuel pumps or other components of the car in which the power is necessary for successful engine start.

But professionals can quickly get around the gap in the wiring, connecting the wires directly or by connecting their engine control unit.

Car hijacking with key theft


Surprisingly the most common way toft car is simple inattention and negligence of vehicle owners. The greatest number of trees of modern cars is associated with keys or remote key chains.

Also, this kind of car hacking is the easiest and most dangerous. Indeed, in this case, criminals are used for the hijacking the native key of the machine.

The greatest danger to the worst of the key represents shops, cafes, restaurants, sports complexes, etc. Especially where many people. Also, the risk to part with the key from the car on the market, in the cinema, at work, in the gym, in a cafe, in a restaurant, in the pool, etc.

Usually criminals work as a group. One group distracts, the other steals the key from the bag, pocket, etc., and then other criminals invite your car while you are, for example, buy products in the supermarket.


Including not rare when the key can steal directly from our hallway. After all, usually we really leave the key in the hallway. And the most amazing thing is that many people do not close the entrance door, which allows criminals to imperceptibly paint your key. It is especially necessary to be attentive when we endure the garbage. After all, in 90% of cases, we really do not close the door.

Also be careful and attentive when visiting public places. Never put the key into open pockets. It is desirable to put the key or keychain into the inner pockets of the outerwear.

And, of course, be vigilant in summer period time. For example, in the country. Remember that at this time the number of hijacking grows several times. Moreover, most of the hijacking are fixed from summer cottages. Therefore, never put the keys in the house on the windowsill. Especially if the windows are open.

Remember that your car is valuable property and naturally the key from it you must protect the same as the car itself.

Future hacking car

Turn on the translation of subtitles

Together with improvement electronic systems The car, which is observed for the last 5 years, progress and technologies hacking modern vehicles. For example, most modern cars are equipped with a network of CAN controllers, which are combined into a single network various actuators and sensors.

So almost every modern car Equipped with various computers, control unit aBS system, ESP, radar, other various systems and sensors, as well as many other electronic gadgets. Automakers in order to combine each other, all electronic devices have developed a single fee (CAN bus), which connects each other. various systems car. The transfer rate of a single controller 1 megabit per second.


Fragment of a roller about a hacking of a modern car

Contemporary tire Can. Also interacts with modern mobile phones, and also knows how to contact the wireless system with the remote key of the machine. In fact, a modern CAN bus is an electronic network of information transmission inside the machine.


Unfortunately, the emergence of a new generation of Can bus in modern cars did not pay attention and hackers who demonstrated that modern cars, with the development of new electronic technology Becoming innovative, unfortunately, did not become protected.

So, a recent group of specialists, decided to show that a modern car can be hacked remotely using a computer. The purpose of this experiment was to show automakers, which together with modern options And functions need to continue to develop new security automotive complexes to increase the safety of vehicles.

Depending on the cost, the hijacker receives from 50,000 to 500,000 rubles. The organizers of the criminal business "earn" even more.

On the Darknet forums, you can find out how the roles between the hijackers are distributed. Central link. He can be a group organizer: buy equipment for theft, coordinate other participants in the scheme.

One of the links of the criminal chain is or "opening". Their task is to neutralize the alarm and prepare a car to distillation. This is a technologically difficult job that is estimated to 10% of the cost of the car. That is, as already mentioned, from 50,000 to 500,000 rubles, depending on the "premium" of the brand and.

Photo carprousa.com.

This amount includes the payment of the car. The role of the distillers usually choose people who are not afraid to risk the sake of "light" money. Among them are even pensioners. In order to deliver a sobbed car from the point "A" to the sump, pay from 5,000 to 15,000 rubles.

After the car "dismisses" and the kidnappers will be confident that there are no satellite trackers and surveillance, the wizard for the interruption and fake documents are taken for the car. This is pre-sale preparation. Payment of craftsmen is about 15% of the cost of the car on secondary market. For premium models of the amount reach up to 500,000 rubles.

Total, in the sales region, the car turns out to be 25% of the cost. Sold for 50% of the cost. The sponsor earns in one hijacking about 25% of the cost of the car. At the same time, he assumes organizational spending and costs of equipment for the hijacking.

Photo clifford.co.uk.

Already after all manipulations for business, a solder is taken, who is looking for buyers. He gets the percentage that "hoists" himself on the cost of the car. The main thing is to give "sponsor" as much money as it was originally stipulated, and everything that beyond it is getting a savings. If the "sponsor" initially, then the salary is excluded from the chain.

The main rule of any such gangster group is strict secrecy and confidentiality. Often, its members are not familiar with each other. It happens that one person combines several links, reducing the number of group members, because the fewer people are involved in the hijacking, the easier it is to catch them. Despite the risks, there are still coughs that come out "on the case" alone. They are usually caught after the second-third crime.

Most of all "earn", of course, "sponsors" or ideological leaders of the ODG.

Photo Wikihow.com

For example, 2014 release on the secondary market costs 400,000 rubles. "Open" for the car will receive 40,000 rubles. The wizard in the interruption of VIN-numbers and fake documents from such a car will receive about 60,000 rubles. Sponsor for this hijacking "will work" about 100,000 rubles. Approximately the same prices for Honda and over 3 years old. But for all these brands it is possible because the machines are in demand in the secondary market and the demand for details does not dry. For Toyota Land Cruiser 200 "Openings" receive from 200,000 rubles. Master of the interruption - from 300,000 rubles. Fully such a car can go to 1,000,000 rubles.

It seems that the "profession" is beneficial for the hijacker? No matter how. Now we will tell you that they receive criminals who caught - and sooner or later catch almost everyone.

Photo dailymail.co.uk.

To begin with, it is worth understanding that the hijacking rosy. All crimes, referred to as this word in everyday life, are considered in different ways to criminal code.

The hijacking (Article 166 of the Criminal Code of the Russian Federation) is the abduction of the car without the purpose of gaining benefits. As a rule, the distillations that are caught with political, they say that the car took the "just ride." It is profitable for them: a maximum that theft will turn, 3 years of imprisonment.

But in most cases, investigators prove that the car was stolen for the sake of profit. In this case, this is another article - theft (Art. 158 of the Criminal Code of the Russian Federation). If there are several kidnappers, it will aggravating the circumstance, and criminals are already under 10 years of imprisonment.

The third case is the ODG (Art. 210 of the Criminal Code of the Russian Federation). If, at the stage of the investigation, it turns out that between all the participants were distributed to the roles that a certain leader and crimes were managed by a grouping, then participants can go for a bastard for 10 years. And the leader risks losing freedom for 20 years. It should be remembered that adults and children starting from 14 years of age are punished.

From January to September 2017, Caesar Satellite experts in Moscow helped operatives to catch 21 participants. In total, they threaten the deadlines for 147 years.

Each convoy thinks about the preservation of his movable property and installs various means of protection on the car.

Dear readers! The article tells about the typical ways to solve legal issues, but each case is individual. If you want to know how solve your problem - Contact a consultant:

Applications and calls are accepted around the clock and seven days a week..

It is fast i. IS FREE!

Currently, you can purchase both separate protection systems and entire anti-theft complexes.

Manufacturers of anti-theft systems promise the maximum level of security when using a particular device. Is it really, read further.

How attackers invigorate TCs and ways to prevent

Modern anti-theft systems are divided into two types:

  • electronic to which security alarms include, GPS beacons, tags, and so on;
  • mechanical: steering wheel blocks, pedal stoppers, gearbox locks and so on.

Electronic devices are connected to the electrical network of the car and constantly or periodically transmit certain signals to communicate with keychain or other devices (telephone, computer and so on).

Mechanical devices are designed to block individual vehicle units. As a rule, blocks are made of high strength steel and equipped with secret locks.

After making any protective device, be alarm, security complex Or mechanical blocker attackers in the shortest possible time is developed for hacking this protection.

Most often, the car's hijack is made at night, when people comes in a deep sleep phase.

The most popular methods of hijacking vehicles are:

  • hacking a protective system through a computer port;
  • the use of jewelry for signals of electronic protective devices;
  • manual hacking through the use of mesh, keys and so on.

We will deal with the most common ways of theft of vehicle and protection methods in more detail.

Hacking through the OBD II port

The OBD II port is installed on all vehicles released after 1996. There is a device in an easily accessible place on the instrument panel.

This connector is used:

  • to find car malfunctions by computer diagnostics;
  • to configure various functionality, including the anti-theft system.

In order to connect the equipment to the OBD II port II professionals takes a few seconds.

If a computer or tablet with special software An attacker to connect to the port, then in the shortest possible time you can:

  • disable anti-theft alarm;
  • unlock the doors and other units to which additional protection is installed;
  • slim up password entry (key, labels) to unlock the ignition system;
  • "Register" in the protection system any key, including from a contactless keychain that protects the ignition system;
  • make an analogue of the native key from the car.

To obtain additional defense From this method of hijacking, the OBD II port connector is necessary to protect the additional overlay equipped with a lock (ready-made devices are sold in auto shops).

In this case, connect to the car system will be difficult, that is, it will take more time to commit a crime, which can scare the thief.

Single alarm

Most of the modern anti-theft complexes are "binding" with the car owner on GSM channels that can be easily overlap with the help of jams, which are always present in the arsenal of professional hijackers.

A special device is designed to join cellular operators during important meetings, conferences and so on. Purchase a device, for example, in the online store, maybe everyone.

How does the muffler work?

The device turned on in a specific radius (depending on the power and cost of the equipment), all transmitted via GSM signals, that is, neither security alarmassociated with the owner, nor GPS lighthouse will be able to transfer the alarm alarm or report the coordinates of the location of the car at a certain point in time or online.

It is impossible to protect against the muffles. Currently, a single device is not invented, capable of resisting the device.

The only thing that can be done is to use a comprehensive protection system, that is, install additional equipment, not transmitting signals on the machine.

Through the interception of the radio signal

The most popular way to "beginner" hijackers is the use of Codegberry.

Codegrabber is a small device that intercepts a radio signal supplied by the alarm system.

In a short period of time (3 - 5 seconds), the device captures the served signal and saves it in memory, that is, an intruder automatically appears from a car and the hijacking becomes a minute.

To protect against Codegrating:

  • do not open the car on a great distance. The standard alarm keychain can operate at a distance of 5 - 10 meters from the vehicle, which allows a person to be present in the same radius with an intercepting radio signal to the device;

    If you open the doors of the machine from the shortest distance, then catch the device signal will be more difficult.

  • contactless key chainsopening the doors or other vehicles of the car can be packaged into a special case that prevents the transmitted signal to spread the transmitted signal.

Manual hacking

Cars not equipped with an alarm systems or old cars that are not equipped with electronic locks are opened by intruders by manual hacking method.

To open vehicle doors are used:

  • slut - Special devices made of durable metal, which simply rotate the larva of the door lock. Such a device is used with theft of budget vehicles, since the likelihood of damage is paint coating body;

  • muchkand - special devices that, with slow rotation, adapt independently under the openings and bends of the door lock. This method of opening the car is more gentle in terms of damage to movable property, as well as requires more time;

  • The device is equipped with a variety of different notches. When opening a lock on the door of the car, all notches are automatically installed in place.
  • After opening the doors of the car, an attacker can turn off the alarm and start the vehicle engine.

    As protection against manual hacking, you can use:

    • various meansblocking the work of individual aggregates;
    • tags that are also intended to block the engine, gearbox and so on;
    • secret.

    Through the keys

    The most common way to the hijacking of a car with an immobilizer or anti-theft complex is a simple keys from the owner (driver).

    Most often theft is made in places of cluster of the people:

    • in shopping centers;
    • in cinemas;
    • in the gym or pool, where the keys are left in the locker room;
    • in cafes or restaurants and so on.

    A significant percentage of car hijacking by theft of keys from the vehicle is increasing in the summer when the country season opens.

    Inattentive car owners leave the doors or windows of the houses open, which makes it easy to commit a crime.

    To prevent the stealing of the keys from the vehicle, it is necessary:

    • do not leave the keys on an easily accessible place;
    • when visiting various institutions, remove the keys to the internal pockets of clothing;
    • to be extremely attentive when contacting unfamiliar people with any questions (this may be distracted by maneuver).

    Hijack on the traffic light

    Most popular among the hijackers is also the distraction of the driver of the vehicle at the traffic light.

    The attack can occur at any moment and the attacker easily will become a vehicle, as the keys in the car and the alarm is disabled.

    However, in such a method of hijacking, unprofessional intruders qualify, since the likelihood of witnesses or other proving the crime of the base (records from surveillance cameras, DVRs, and so on).

    In order not to become a victim of a fraudster on an adjustable intersection recommended:

    • when leaving the car, do not leave the keys in the ignition lock;
    • do not leave the doors open;
    • if a robbery attack is performed by all ways to attract the attention of others.

    Others

    There are other, less popular methods of hijacking vehicles:

    • the use of the tow truck. As a rule, this method is applied in large cities, where the evacuation service works almost around the clock and does not attract special attention to others;
    • production of duplicate keys. This method is also preferentially used by non-professional, since the likelihood of disappearance is large;
    • robber attack, that is, intentional theft carried out in the presence of a driver and made with a threat to life or human health.

    It is possible to protect against the evacuation of the car by attackers with the help of a modern anti-theft system, which works not only when penetrating the vehicle, but also to raise it (moving).

    To obtain comprehensive protection in the case of the manufacture of duplicates or robbery will only help the attentiveness of the car owner.

    Where are the stolen cars come true

    The most frequently asked by the car owner is: where the stolen cars are reversed, since the percentage of the found motor vehicles compared to the stolen-insignificant.

    Chest cars can:

    • sold by other people. For this, fake documents (PTS, registration certificate) are manufactured on the vehicle and the numbers are interrupted on units: the body, chassis, engine, as well as the VIN number;

      For sale hijacked as popular with consumers of the model (for example, Hende Solaris, Kia Rio) and expensive cars (hijacked after receiving a pre-order on this or that model).

    • to understand the spare parts, that is, after the hijacking, the vehicle does not move along the roads, but disassembled and supplied to the stores selling used by spare parts;
    • returning car owners for money remuneration. In such fraud, as a rule, beginner non-professional thieves are engaged.

    Return statistics

    According to statistical data, about 50,000 cars are caught in our country, and the most popular models among attackers are:

    • VAZ (mostly Lada Priora);
    • Toyota;
    • Mazda;
    • Hyunda;
    • Ford;
    • Nissan.

    And how many cars are and returning to legal car owners?

    Statistical data from different sources report that on average, 15% to 35% of the stolen vehicles are from 15%, and the percentage of return fluctuates depending on the following factors:

    • year of year. In the winter months, cars are less common than in the warm season;
    • the crime regony. In major cities returns more carsthan in medium and minor settlements;
    • marks and car models, as well as the presence / absence of an anti-theft system.