Hackers Block US Road With 50 Self-Driving Cars in Cyber Attack

Tech prankster coordinates 50 simultaneous ride requests to dead-end street, exposing physical-world vulnerabilities in autonomous fleet systems

Annemarije de Boer Avatar
Annemarije de Boer Avatar

By

Our editorial process is built on human expertise, ensuring that every article is reliable and trustworthy. AI helps us shape our content to be as accurate and engaging as possible.
Learn more about our commitment to integrity in our Code of Ethics.

Image credit: Wikimedia

Key Takeaways

Key Takeaways

  • Riley Walz coordinated 50 simultaneous Waymo requests creating first robotaxi DDoS attack
  • Waymo disabled all rides within two-block radius for hours after traffic jam
  • Attack weaponized normal app functionality to disrupt physical infrastructure without hacking

Fifty self-driving cars converged on San Francisco’s longest dead-end street in July 2025, creating what tech prankster Riley Walz dubbed the “world’s first Waymo DDoS.” The 23-year-old software engineer coordinated simultaneous ride requests through the app, sending an entire fleet of Jaguar I-Pace robotaxis to the same impossible destination.

While participants never entered the vehicles, the stunt exposed vulnerabilities in autonomous vehicle transportation that feel ripped from dystopian fiction. You’re looking at a real-world stress test that revealed how digital coordination can disrupt physical infrastructure in ways traditional cybersecurity never anticipated.

The Technical Execution

Walz organized exactly 50 people to request rides to the same dead-end location simultaneously. The Waymo vehicles dutifully arrived, creating a bizarre traffic jam of empty cars waiting for passengers who never came.

None of the conspirators entered their assigned vehicles, treating the exercise as a stress test rather than actual transportation. The cars remained idle for approximately ten minutes before automatically departing, each charging the standard $5 no-show fee to the pranksters who summoned them.

Fleet-Level Countermeasures

The company’s reaction proved more interesting than the prank itself. Within hours, Waymo temporarily disabled all ride requests within a two-block radius until the following morning, demonstrating fleet-level geofencing controls that can quarantine entire neighborhoods.

This rapid countermeasure suggests the company anticipated coordinated system abuse, even if they didn’t expect it to manifest as physical traffic jams. Waymo characterized the incident as helpful for refining service protocols in complex urban environments, according to Road and Track.

Smart City Vulnerability Preview

This wasn’t traditional cybersecurity exploitation—no servers crashed, no data was stolen. Instead, Walz weaponized normal app functionality to create physical-world chaos, illustrating how smart city infrastructure becomes vulnerable to coordinated misuse.

You’re witnessing the early stages of a new attack vector where digital coordination can disrupt physical space. The same vulnerabilities exist across ride-hailing, food delivery, and eventually any on-demand service that moves objects through urban space.

The incident follows Walz’s previous SF parking citation tracking app, which city officials quickly neutralized after media attention. Public response split between amusement and genuine concern about autonomous vehicle readiness for widespread deployment, according to Hoodline reporting.

This stress test revealed both system weaknesses and robust response capabilities—but it also previewed the regulatory challenges cities face when transportation becomes programmable.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →