A cybersecurity researcher has managed to compromise a Tesla vehicle through a Man-in-the-Middle attack. In a YouTube video he shows the process.

The process involves creating a WiFi network at the charging station, looking for users to be able to connect and thus obtain Tesla account credentials, since when connecting to this network, the login data is requested.

Then, With those credentials, the legitimate Tesla app is logged in and the vehicle is added, since the car is not required to be open or the phone inside it to set up what Tesla calls “Phone Key”.

Fountain: Bleeping Computer


Leave a Reply

Your email address will not be published. Required fields are marked *

More news
A cybercriminal manages to use AI to steal data from the Mexican Government
Read more »
Intec creates an AI that redefines the rules of the game in cybersecurity in the AI era.
Read more »
Una exfiltración de datos afecta a un proveedor de Adidas
Read more »
Se incrementan un 26% los incidentes de ciberseguridad
Read more »
Un ciberataque paraliza en Roma la Universidad La Sapienza
Read more »