WHAT’S BEING CLAIMED:
- RedLock’s security researchers have discovered that Tesla’s Kubernetes console was invaded, revealing the EV brand’s login credentials for Amazon Web Services.
- After being notified by RedLock, the automaker company has already taken actions.
- The intrusion continues to become a trend among companies and even the militaries making sensitive information unprotected.
Cybersecurity firm Redlock said that Tesla’s cloud system to mine cryptocurrency has been compromised. The hijackers got access without a password, exposing the company’s login credentials for Amazon Web Services.
The intruders both abused Tesla’s cloud resources for cryptojacking and retrieved secret data held in Amazon’s S3 service. The invaders installed a mining pool software and directed a script to arrive at an ‘unlisted’ destination.
Their action made it difficult to just block the “cryptojacking” based on internet addresses. The perpetrators did not just obscure their mining pool server address via CloudFlare, but also decreased processor use to prevent getting caught.
Tesla has been notified immediately, according to Redlock, when the breach was discovered. The electric automotive company issued a statement via email after an immediate investigation.
“We maintain a bug bounty program to encourage this type of research, and we addressed this vulnerability within hours of learning about it. The impact seems to be limited to internally-used engineering test cars only, and our initial investigation found no indication that customer privacy or vehicle safety or security was compromised in any way.”
RedLock noted that there have been numerous cryptojacking incidents like this at other businesses and suggested that companies should have cybersecurity to avoid being compromised.
Source: Yahoo Finance