At Black Hat Asia 2025, experts will reveal a major flaw in modern dashcams, showing how hackers can use these devices to steal data and invade privacy.
The talk, DriveThru Car Hacking: Fast Food, Faster Data Breach, is scheduled for April 3, 2025, at Marina Bay Sands, Singapore.
Dashcams are now common for recording accidents and supporting insurance claims.
However, researchers warn these devices can be hacked if they lack proper security.
At Black Hat Asia 2025, Alina Tan, co-founder of HE&T Security Labs, and a global tech team will reveal flaws in over 24 popular dashcam models.
They developed “DriveThru Hacking,” a method that automates dashcam attacks over Wi-Fi.
With this technique, hackers can scan for devices, break in, steal data, and even analyze recordings using AI tools—all within minutes.
A live demo will show how attackers can capture private conversations, track routes, and collect sensitive data from compromised dashcams.
Automated Attacks and Privacy Risks
Researchers found this attack works on many dashcam brands, not just specific ones. It uses weak Wi-Fi security and poor data protection found across multiple models.
With automated tools, hackers can scan, connect, and steal data from nearby dashcams in minutes. This includes videos, GPS logs, and private conversations, all without the driver knowing.
At Black Hat Asia, the team will show real examples of data they gathered during testing, proving how easily these attacks can happen.
How to Protect Your Dashcam
Experts recommend these steps to reduce the risk:
- Update Firmware Regularly: Install the latest security patches from the manufacturer.
- Disable Unnecessary Wi-Fi Access: Turn off remote access when not in use.
- Use Strong Passwords: Change default credentials to something complex and unique.
- Encrypt Stored Data: Choose dashcams that offer encryption for video and GPS logs.
- Network Segmentation: If the dashcam connects to your home or car Wi-Fi, isolate it from other devices.
Following these practices can help prevent unauthorized access and protect your privacy.
Follow Us on: Twitter, Instagram, Facebook to get the latest security news!
Leave A Comment