Deep Dive

What Is a CAN Bus Attack?

A CAN bus attack bypasses your car's security by speaking directly to its internal network. Instead of tricking the key fob system like a relay attack, this method plugs into the vehicle's wiring and sends commands that the car obeys without question. The result: doors unlock, the immobilizer disables, and the engine starts—all without a key.

The Short Answer

CAN bus injection attacks work by connecting a device to your vehicle's Controller Area Network—the internal communication system that links all electronic modules. By sending the right commands on this network, attackers can unlock doors, disable the immobilizer, and start the engine. The attack typically takes 2–3 minutes and requires physical access to an external wiring point, most commonly a headlight connector.

What Is the CAN Bus?

Before understanding the attack, you need to understand what it's targeting.

The Controller Area Network (CAN) is the communication backbone of modern vehicles. Developed by Bosch in 1986 and widely adopted since the early 2000s, it connects every electronic control unit (ECU) in your car: engine management, transmission, braking system, airbags, door locks, lighting, climate control, infotainment—everything.

When you press your key fob to unlock the door, a message travels over the CAN bus from the receiver module to the body control module: "Unlock doors." When you press the start button, messages flow between multiple modules: "Key authenticated," "Immobilizer check passed," "Enable fuel pump," "Engage starter." The CAN bus is how these systems coordinate.

The Design Trade-Off

The CAN bus was designed for reliability and speed in automotive environments—vibration, temperature extremes, electrical noise. It excels at this. What it wasn't designed for is security.

Messages on the CAN bus are broadcast to all connected modules. There's no authentication—any device connected to the network can send any message, and other modules will execute the command without verifying who sent it. This made sense in the 1980s when the assumption was that only factory-installed components would ever connect. That assumption no longer holds.

How CAN Bus Injection Works

The attack exploits the CAN bus's lack of message authentication. Here's the sequence:

1

Find an Access Point

The attacker needs physical access to the CAN bus. The most common entry point is the headlight wiring harness—smart LED headlights connect to the CAN bus for adaptive lighting features. Other access points include side mirror connectors, bumper sensors, or any external component with CAN connectivity.

2

Gain Physical Access

The thief removes or manipulates the external component to expose the wiring. For headlights, this often means popping the hood (if unlocked) or prying the headlight assembly—a process that takes 30–60 seconds for someone practiced.

3

Connect the Injection Device

A small device—often disguised as a JBL speaker, power bank, or diagnostic tool—is connected to the exposed CAN wires. These devices are purpose-built for specific vehicle makes and models, programmed with the correct message formats.

4

Send Unlock Command

The device broadcasts a message on the CAN bus: "Unlock all doors." The body control module receives this message and executes it—because it has no way to know the command didn't come from the legitimate key receiver.

5

Disable the Immobilizer

The device sends additional messages that mimic a successful key authentication: "Immobilizer check passed." The engine control unit receives this and prepares to allow engine start.

6

Start the Engine

With the immobilizer bypassed, the device sends "Start engine." The thief enters the vehicle (already unlocked), presses the start button or uses the injection device to complete the start sequence, and drives away.

The entire process takes 2–3 minutes. Unlike relay attacks, there's often minor physical evidence—a removed headlight, pry marks on trim—but the vehicle shows no signs of forced entry in the traditional sense. Security cameras typically show someone working calmly at the front of the car, then getting in and driving away.

The "Headlight Method"

CAN bus injection gained widespread attention when the "headlight method" became the dominant technique for stealing certain luxury vehicles, particularly Toyota Land Cruisers, Lexus LX models, and various BMW X-series SUVs.

Modern adaptive LED headlights connect to the CAN bus because they need to communicate with other vehicle systems. Features like automatic high-beam adjustment, cornering lights, and dynamic leveling require data from steering angle sensors, speed sensors, and other modules. This connectivity creates an externally-accessible entry point to the vehicle's internal network.

Why Headlights?

Headlights are attractive attack points for several reasons:

  • External access: Unlike the OBD port inside the cabin, headlights can be accessed without first getting into the vehicle.
  • Quick removal: Many headlight assemblies are designed for easy bulb replacement and can be removed or displaced in under a minute.
  • Direct CAN connection: Smart headlights often connect directly to the main CAN bus, not an isolated sub-network.
  • Hood access: On many vehicles, the hood release is accessible without unlocking the doors—either through the grille or because the hood isn't latched securely.

Not Just Headlights

While headlights are the most publicized access point, any external CAN-connected component is potentially vulnerable: side mirror heating/adjustment motors, parking sensors, bumper-mounted cameras, and even some grille-mounted radar sensors. As manufacturers secure one access point, attackers explore others.

Which Vehicles Are Vulnerable

CAN bus injection is theoretically possible on any vehicle with externally-accessible CAN bus connections. In practice, attacks target specific models where:

  • The CAN message format has been reverse-engineered
  • Injection devices are available (either commercial or shared in criminal networks)
  • The vehicle is valuable enough to justify the effort

Frequently Targeted Models

Documented CAN bus injection thefts have affected:

  • Toyota/Lexus: Land Cruiser, Lexus LX, Highlander, RAV4
  • BMW: X5, X6, X7, and various 3/5/7 Series models
  • Mercedes-Benz: GLE, GLS, G-Class
  • Land Rover: Range Rover, Range Rover Sport, Defender
  • Jeep: Grand Cherokee

This list is not exhaustive and evolves as new injection tools are developed. Luxury SUVs are disproportionately targeted because their high resale value—often for export—justifies the more technical attack method.

Manufacturer Responses

Some manufacturers have begun implementing countermeasures in newer models:

  • CAN bus gateways: Isolating critical security functions on a separate network segment that external components can't access directly.
  • Message authentication: Adding cryptographic verification to CAN messages so that unauthorized commands are rejected.
  • Intrusion detection: Monitoring CAN traffic for anomalous patterns that indicate an attack in progress.

These protections are appearing in some 2023+ model year vehicles, but implementation varies by manufacturer and model. Older vehicles lack these defenses entirely, and even new protections may have implementation weaknesses.

CAN Bus Injection vs. Relay Attacks

Both methods steal keyless vehicles, but they work differently and have different requirements:

Factor Relay Attack CAN Bus Injection
Target Key fob signal Internal vehicle network
Key proximity needed Yes (within relay range) No
Physical vehicle access Not required initially Required (external wiring)
Time to execute 30–60 seconds 2–3 minutes
Evidence left None Minor (removed trim, headlight)
Faraday pouch stops it Yes No
Equipment cost $100–$500 $2,000–$10,000+

The key distinction: relay attacks require proximity to your key fob, so Faraday storage defeats them. CAN bus injection doesn't involve your key at all—it directly commands the vehicle. Storing your key in a Faraday pouch does nothing against this method.

What Doesn't Stop CAN Bus Attacks

Faraday Pouches and Signal Blocking

CAN bus injection doesn't use your key fob's signal. The attack bypasses the key entirely by injecting commands directly into the vehicle's network. Blocking your key's signal has no effect.

Factory Immobilizers

The factory immobilizer checks are performed by modules connected to the CAN bus. When the injection device sends "immobilizer check passed," the engine control unit accepts this message as valid. The immobilizer is bypassed, not defeated—it's simply told that authentication already happened.

Factory Alarms

The alarm system also communicates over the CAN bus. Injection devices can send "disarm alarm" commands before unlocking doors, or the alarm module may interpret the network activity as a legitimate unlock sequence. In either case, the siren stays silent.

GPS Trackers (Alone)

A GPS tracker can report your vehicle's location after it's been stolen, but it does nothing to prevent the theft. Trackers aid recovery, not prevention, and professional thieves often use signal jammers or locate and disable trackers before driving far.

What Actually Prevents CAN Bus Attacks

Effective protection against CAN bus injection requires either blocking access to the network or adding authentication that the injection device can't replicate.

Block Physical Access

Since CAN bus injection requires connecting to the vehicle's wiring:

  • Hood locks: Aftermarket hood locks prevent the hood from being opened without a key or special tool, blocking access to headlight wiring harnesses accessed from inside the engine bay.
  • Headlight protection: Some owners install tamper-resistant screws or security brackets that make headlight removal significantly slower and louder.
  • Garage parking: If the vehicle isn't accessible, the attack can't happen.

Physical barriers add time and difficulty. They're not impenetrable, but they may cause thieves to move to an easier target.

Add Secondary Authentication

The most effective countermeasure is adding an authentication layer that operates independently of the CAN bus commands:

  • Aftermarket digital immobilizers: These devices connect to the CAN bus but add a PIN requirement before allowing engine start. Even if an injection device sends "start engine," the immobilizer blocks ignition until the correct PIN is entered via factory buttons. The thief has no way to know or inject the PIN.

This approach works because the immobilizer introduces a check that can't be bypassed by CAN commands—it requires physical interaction with a sequence that only the owner knows.

Combine Layers

The strongest protection combines physical access barriers with secondary authentication:

  • Hood lock (slows access to engine bay)
  • Digital immobilizer (requires PIN even if CAN bus is compromised)
  • GPS tracker (recovery backup if prevention fails)

No single measure is perfect. Hood locks can eventually be defeated. Digital immobilizers could theoretically be removed if a thief had unlimited time. Layered security makes each barrier harder to overcome within the time window a thief is willing to spend.

Signs of an Attempted CAN Bus Attack

Unlike relay attacks, CAN bus injection may leave physical evidence:

  • Displaced or missing headlight: A headlight that's crooked, has visible gaps, or is missing entirely.
  • Pry marks: Scratches or dents around the headlight housing, grille, or hood seams.
  • Dangling wires: Visible wiring or connectors that aren't properly seated.
  • Hood ajar: A hood that's not fully closed or latched.
  • Trim pieces removed: Interior or exterior trim panels that are loose or missing clips.

If you see these signs and your vehicle is still present, the attack may have been interrupted or unsuccessful. Have the vehicle inspected—an incomplete injection attempt may have left behind a connected device, or wiring may be damaged.

The Takeaway

CAN bus injection attacks exploit a fundamental design limitation: the vehicle's internal network trusts any connected device. By plugging into external wiring—most commonly through headlights—thieves can send commands that unlock doors, disable immobilizers, and start engines.

Unlike relay attacks, Faraday pouches don't help here because the key isn't involved. Effective protection requires either blocking physical access to CAN bus entry points or adding secondary authentication (like a PIN-based immobilizer) that can't be bypassed by network commands alone.

Part of: How Modern Cars Are Stolen