this post was submitted on 17 Mar 2026
34 points (97.2% liked)
Technology
42518 readers
199 users here now
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Original post has no mention on how he did it. He just sent someone in comments a link to a forum where they develop some sort of dev button. Nothing more. I call sus on this one.
Didn't realize folks would want a proof-of-concept of HOW it was done.
If you want a proof-of-concept, like steps for how to do the thing, that's here: https://hackaday.com/2022/07/18/hacker-liberates-hyundai-head-unit-writes-custom-apps/
All this article does is just throws random hacker buzzwords for reader to get scared of a hacker boogieman. But, at least it has link to the blog. You shoul've sent it instead. This blog entry is what it should have been posted to begin with.
Haven't seen that OP posted this link somewhere on their original reddit post. Reading "I hacked X and had fun" with only a picture doesn't strike me as impressed. With a step-by-step journal - now we're talking.
I'm betting the infotainment system runs on Android and they side loaded Moonlight or something similar.
Edit: There is a comment on the reddit post where he said he used the update system to execute scripts with admin privileges
Linux, but you can run Android apps once you root it :)
It's an excessively involved process at the moment, this individual managed it by using a common malware method, he imitated a legitimate OTA update but rewrote it to root the system. He was basically his own supply-chain-attacker: https://hackaday.com/2022/07/18/hacker-liberates-hyundai-head-unit-writes-custom-apps/