- Pandora device enables 30-second car theft by relaying key signals through walls.
- Operation led to 31 arrests across Europe; law enforcement seized software, connectors, assets.
- Network included developers, distributors, and online “auto diagnostic” sales of equipment.
- Keyless-entry vulnerabilities highlighted; What Car? tests reveal alarming security issues.
European authorities recently dismantled a sophisticated continental crime network that specialized in luxury vehicle theft through advanced electronic hacking techniques. This criminal organization developed and marketed software equipment that enables vehicle theft in tens of seconds, leaving no traditional signs of break-in.
The operation led to 31 arrests, including both software developers and distributors of these devices on the black market. During searches, law enforcement seized sophisticated software, specialized connectors, and assets obtained through car thefts.
Pandora technology: the secret weapon of modern thieves
The central device of this operation is called Pandora and represents an extremely advanced auto-hacking technology. This equipment, which costs about €10,000 on the black market, can scan and clone car keys through the walls of a house, without the owner having the slightest suspicion.
How the relay attack works
The technique, known as the relay attack or the “30-second heist,” exploits vulnerabilities in keyless entry systems. The process works as follows:
- Scanning the car key frequency through the walls of the house
- Rapid cloning of the electronic signal
- Opening the doors and starting the engine without the original key
- Disappearing with the vehicle in a maximum of 30 seconds
Europol confirmed that the criminals targeted keyless vehicles from two French brands, though the manufacturers’ names were not released publicly for security reasons.
Criminal infrastructure and distribution of equipment
The criminal organization operated with a well-organized structure to market the hacking equipment:
- Developers: created the software and adapted the equipment for different car models
- Distributors: a network of ten active resellers across Europe
- Online sales: a dedicated website presenting the equipment as “auto diagnostic solutions”
The full kit, including the tablet, connectors and software, was marketed under the guise of legitimate auto diagnostic tools, which made detection and tracing much more difficult.
The situation in Romania: a growing problem
Romania is not spared from these kinds of modern auto crimes. Romanian authorities have already uncovered two local groups using Pandora technology on national territory. These criminal organizations have adapted international methods to local specifics.
Destination of stolen vehicles
Stolen cars through these methods are:
- Quickly resold in the underworld
- Processed to erase VIN numbers
- Extremely hard to recover due to modifications
- Often transported to other countries to hinder tracking
Vulnerabilities of keyless entry systems
Modern vehicles equipped with keyless entry systems are the most vulnerable to these attacks. This technology, designed for driver convenience, has paradoxically become a major weak point in car security.
Security test results
Tests conducted by What Car? magazine reveal alarming vulnerabilities across several models:
- DS 3 Crossback: stolen in 10 seconds
- Audi TT RS: stolen in 10 seconds
- Land Rover Discovery: accessed in 20 seconds (but could not be started)
- Land Rover Discovery Sport: stolen completely in 30 seconds
- Mercedes A-Class: stolen in 50 seconds
- BMW X3 and Ford Fiesta: stolen after about a minute
These results show that even vehicles considered safe can be compromised relatively quickly by skilled criminals.
Protection measures and recommendations
Auto-security experts recommend several preventive measures for owners of vehicles with keyless systems:
Physical protection of keys
- Distance the keys: keep the keys as far away from your entry door as possible
- Protective sleeves: use aluminum sleeves that block radio signals
- Faraday boxes: store keys in metal boxes that isolate electromagnetic signals
Additional security measures
- Install additional alarm systems
- Use mechanical locks (e.g., steering wheel locks)
- Park in well-lit and monitored areas
- Periodically check the vehicle’s security systems
The evolution of auto crime in the digital era
The Pandora network case illustrates the evolution of auto crime in the digital era. If in the past car thieves relied on brute force and mechanical skills, today they use sophisticated technologies and programming knowledge to achieve their objectives.
This paradigm shift forces both auto manufacturers and authorities to continually adapt their security strategies to address increasingly sophisticated and harder-to-detect threats.