Tesla. News.steemCreated with Sketch.

in news •  7 years ago 

Tesla's cloud storage was hacked and used for mining

RedLock Cloud Security Intelligence (CSI), which deals with cybersecurity, reported that the Tesla cloud storage account was hacked and used for crypto currency mining.

Specialists of RedLock managed to identify a vulnerability that allowed hackers to hack the cloud Tesla, thanks to the platform Kubernetes from Google. This type of vulnerability was discovered as early as last month, when RedLock tried to find out who had left Amazon Web Services accounts open to the public.

It's worth mentioning that Tesla and Amazon are not the first victims of hacker-miners. Prior to this, attackers already had access to companies such as Aviva and Gemalto. After discovering the vulnerability and the fact of hidden mining, RedLock specialists immediately reported this to Tesla, after which the company quickly corrected the situation. A representative of Tesla confirmed that the threat was neutralized, and no user data fell into the hands of intruders:

"We support a program to identify errors in order to encourage such research. Thanks to this, we managed to eliminate the threat within a few hours after its discovery. "
Also, the spokesman noted that the impact of the hacking of the cloud storage account had an impact only on the operation of test vehicles, and did not affect the safety and confidentiality of vehicles in any way. Also, according to the report of RedLock, once hackers got access to Tesla cloud servers, they launched the Stratum mining protocol for crypto currency production. Also, hackers shied away from detection, masking the true IP address of the mining server and keeping low consumption of GPU capacities.

What is especially interesting, according to RedLock, the very fact of using cloud servers Tesla is much more valuable than all the information stored on them.

It seems that we stepped into a new era - when the power of companies became much more valuable for hackers than the information that they can steal.

1_FPY8PbdSA4yv6X-86bjIhA.jpeg

Source: https://vk.cc/7JZlcp

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!