This is how a Tesla is stolen by hacking its mobile application

In the age of mobile phones, apps and self-driving cars, what can go wrong? Well in reality almost everything, it seems that robar a Tesla using a hacked version of your application that allows you to control the vehicle, it is much easier than we could imagine. In the video that we leave inside the article you will be able to see astonished for yourself how easy they are made with the vehicle. It is one of the negative points of technology, software and the mobile age, that everything is in the hands of the right hackers, being able to handle everything at will.

A security company calls Promon and that we have been able to see on the website of our colleagues Microsiervos, have been in charge of making us see how exposed we can be with this type of applications. They use an open WiFi network for this and take advantage of the user's connection and perennial security flaws in Android to modify the Tesla application in turn. It is a cluster of coincidences that must occur, but not for that reason they are impossible. In fact, they have shown that it can be done and can thus take complete control of a Tesla Model S, nothing more and nothing less.

Serve the video as an explanatory way and not as another thief method. It is the laptop that we see in the video, which is in charge of doing the dirty work, since it receives the user information and the password of the car in question and takes control as far as possible. In this case, everything is ready, the driver and owner voluntarily collaborate in the experiment. Once again, the security of the "internet of things" is called into question and how it can make us really vulnerable, the future of theft is going to be digital, no doubt.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.