Skip to main content

Blog PerfektBlue Attack Exposes Millions of Vehicles to Remote Hacking Threats

Would you like to learn more?

Download our Pentest Sourcing Guide to learn everything you need to know to successfully plan, scope, and execute your penetration testing projects.

Cybersecurity researchers have discovered a new exploit dubbed PerfektBlue that potentially allows attackers to remotely control millions of connected cars. Leveraging insecure implementations of Bluetooth Low Energy (BLE) protocols, this exploit enables unauthorized access to a vehicle's central systems—without physical contact.

According to researchers who disclosed the vulnerability, the PerfektBlue attack targets third-party infotainment systems, diagnostic tools, and digital key apps, commonly installed in newer vehicle models across North America and Europe. Manufacturers affected have not yet been officially named due to ongoing investigations, but estimates suggest that as many as 6 million vehicles could be vulnerable.

How PerfektBlue Works

The PerfektBlue vulnerability stems from a common BLE misconfiguration that fails to validate device authenticity. By mimicking a trusted device—such as a driver’s smartphone or key fob—attackers can exploit unsecured pairing protocols to gain elevated access to internal vehicle controls. In lab demonstrations, researchers were able to:

  • Unlock vehicle doors

  • Disable immobilizer systems

  • Interact with media and navigation controls

  • In rare cases, gain access to diagnostic interfaces that could allow remote control of steering or braking assist functions

What makes PerfektBlue particularly alarming is that the attack can be executed remotely from up to 30 meters away and does not require physical tampering with the vehicle.

Industry Response

The National Highway Traffic Safety Administration (NHTSA) and European Union Agency for Cybersecurity (ENISA) have both issued preliminary alerts urging manufacturers to review their use of BLE components and to deploy patches for systems found vulnerable to PerfektBlue.

Meanwhile, car owners have been advised to:

  • Disable Bluetooth functionality when not in use

  • Avoid connecting unverified third-party apps to their vehicle systems

  • Regularly check for firmware and software updates from vehicle manufacturers

Why This Matters: The Convergence of Transportation and Cybersecurity

The PerfektBlue attack illustrates the shifting landscape of cybersecurity threats, where the convergence of IoT, mobile applications, and transportation has created new attack surfaces with potentially life-threatening consequences.

For automotive manufacturers and suppliers, this incident emphasizes the urgency of:

  • Incorporating secure-by-design principles into connected vehicle components

  • Conducting third-party penetration testing and threat modeling across digital interfaces

  • Complying with emerging standards such as ISO/SAE 21434 and UN Regulation No. 155

As cybersecurity professionals, it’s critical to recognize that vehicles are no longer mere mechanical machines—they are endpoint devices with connectivity rivaling smartphones and complexity akin to enterprise networks.

Conclusion

PerfektBlue is more than just a wake-up call—it's a preview of what’s to come as our reliance on connected mobility accelerates. As vehicles grow smarter, so must our defenses. For organizations in the automotive industry, third-party security validation and regular penetration testing aren’t optional—they’re essential.

Contact Us

Speak with an Account Executive

Packetlabs Company Logo
    • Toronto | HQ
    • 401 Bay Street, Suite 1600
    • Toronto, Ontario, Canada
    • M5H 2Y4
    • San Francisco | HQ
    • 580 California Street, 12th floor
    • San Francisco, CA, USA
    • 94104