A cybersecurity researcher has managed to compromise a Tesla vehicle through a Man-in-the-Middle attack. In a YouTube video he shows the process.

The process involves creating a WiFi network at the charging station, looking for users to be able to connect and thus obtain Tesla account credentials, since when connecting to this network, the login data is requested.

Then, With those credentials, the legitimate Tesla app is logged in and the vehicle is added, since the car is not required to be open or the phone inside it to set up what Tesla calls “Phone Key”.

Fountain: Bleeping Computer


Leave a Reply

Your email address will not be published. Required fields are marked *

More news
New wave of scams using AI-cloned voices
Read more »
Una brecha en la Comisión Europea salpica unas treinta instituciones
Read more »
Un ciberataque expone datos y entradas de aficionados del FC Ajax
Read more »
Michelin suffers a data exfiltration
Read more »
Atacan un centro de investigación nuclear en Polonia
Read more »