Blog PerfektBlue Attack Exposes Millions of Vehicles to Remote Hacking Threats
Would you like to learn more?
Download our Pentest Sourcing Guide to learn everything you need to know to successfully plan, scope, and execute your penetration testing projects.
Cybersecurity researchers have discovered a new exploit dubbed PerfektBlue that potentially allows attackers to remotely control millions of connected cars. Leveraging insecure implementations of Bluetooth Low Energy (BLE) protocols, this exploit enables unauthorized access to a vehicle's central systems—without physical contact.
According to researchers who disclosed the vulnerability, the PerfektBlue attack targets third-party infotainment systems, diagnostic tools, and digital key apps, commonly installed in newer vehicle models across North America and Europe. Manufacturers affected have not yet been officially named due to ongoing investigations, but estimates suggest that as many as 6 million vehicles could be vulnerable.
How PerfektBlue Works
The PerfektBlue vulnerability stems from a common BLE misconfiguration that fails to validate device authenticity. By mimicking a trusted device—such as a driver’s smartphone or key fob—attackers can exploit unsecured pairing protocols to gain elevated access to internal vehicle controls. In lab demonstrations, researchers were able to:
Unlock vehicle doors
Disable immobilizer systems
Interact with media and navigation controls
In rare cases, gain access to diagnostic interfaces that could allow remote control of steering or braking assist functions
What makes PerfektBlue particularly alarming is that the attack can be executed remotely from up to 30 meters away and does not require physical tampering with the vehicle.
Industry Response
The National Highway Traffic Safety Administration (NHTSA) and European Union Agency for Cybersecurity (ENISA) have both issued preliminary alerts urging manufacturers to review their use of BLE components and to deploy patches for systems found vulnerable to PerfektBlue.
Meanwhile, car owners have been advised to:
Disable Bluetooth functionality when not in use
Avoid connecting unverified third-party apps to their vehicle systems
Regularly check for firmware and software updates from vehicle manufacturers
Why This Matters: The Convergence of Transportation and Cybersecurity
The PerfektBlue attack illustrates the shifting landscape of cybersecurity threats, where the convergence of IoT, mobile applications, and transportation has created new attack surfaces with potentially life-threatening consequences.
For automotive manufacturers and suppliers, this incident emphasizes the urgency of:
Incorporating secure-by-design principles into connected vehicle components
Conducting third-party penetration testing and threat modeling across digital interfaces
Complying with emerging standards such as ISO/SAE 21434 and UN Regulation No. 155
As cybersecurity professionals, it’s critical to recognize that vehicles are no longer mere mechanical machines—they are endpoint devices with connectivity rivaling smartphones and complexity akin to enterprise networks.
Conclusion
PerfektBlue is more than just a wake-up call—it's a preview of what’s to come as our reliance on connected mobility accelerates. As vehicles grow smarter, so must our defenses. For organizations in the automotive industry, third-party security validation and regular penetration testing aren’t optional—they’re essential.
Contact Us
Speak with an Account Executive
Explore in-depth resources from our ethical hackers to assist you and your team’s cyber-related decisions.

September 13 - Blog
Why Multi-Factor Authentication is Not Enough
Knowing is half the battle, and the use and abuse of common frameworks shed insight into what defenders need to do to build defense in depth.

November 19 - Blog
The Top Cybersecurity Statistics for 2024
The top cybersecurity statistics for 2024 can help inform your organization's security strategies for 2025 and beyond. Learn more today.

October 24 - Blog
Packetlabs at SecTor 2024
Packetlabs is thrilled to have been a part of SecTor 2024. Learn more about our top takeaway's from this year's Black Hat event.