Tesla Electric Hacking
Is One Phone Enough?
Tesla in Hacking Controversy
Automobile software has seen explosive growth along with technological advancements. With the tremendous growth in features, the possibility of personal information leakage has also drastically increased. Proving this point, a YouTuber revealed a method to access and steal a Tesla vehicle.
The YouTube channel Mysk uploaded a related video on the 10th. This video shows how to access the owner information necessary to steal a Tesla. Let’s find out what this video contains.
The Start of Tesla Hacking
Public Wi-Fi
The YouTuber’s video explains the process of hacking a Tesla model. The process starts with an assumption of a hacker using a device that can create a Wi-Fi network, causing the car owner to connect to the hacker’s network.
Once the owner connects their phone, a message appears asking for email and password details to access the Tesla account. This is similar to many public Wi-Fi network login pages, like those in airports, so the owner will likely be fooled into thinking the network they are using is safe.
Once Access is Granted, It’s Hard to be Removed
The device used by the hacker copies information and follow-up 2-step authentication passwords. It then supports logging into the car owner’s Tesla account and accessing the mobile key. Once these details are stored on the hacker’s phone, they gain access rights to Tesla.
Tesla owners who have been hacked in this way reportedly find it difficult to reclaim access rights from hackers. Additionally, the hacker can access the vehicle or determine the owner’s location at any time through the location tracking attached to the Tesla.
Hacked in 2 Minutes by 2023
Can We Trust Electric Cars?
The YouTuber claims to have carried out this hack only on one of his cars to demonstrate Tesla’s security flaw. Car application hacking is not new, so Tesla is currently conducting a “Hackathon” event aimed at preventing and identifying issues. At this event in 2023, it was a big shock when the Model 3 was breached in about two minutes.
Netizens have expressed their disappointment at this fact. Many also voiced the opinion that public network use should be avoided. As cars become more closely connected to our lives, the potential for personal information leakage will increase. Car manufacturers have a responsibility to prepare countermeasures to protect consumer safety.
Most Commented