Tesla Hit By Cryptojacking

Tesla Hit By Cryptojacking

On Tuesday the 20th of February,  Redlock, a cloud and monitoring defense firm published that Tesla was the latest victim of cryptojacking. The report did not mention what cryptocurrency was being mined or how long the hackers were using the malware.

What is Cryptojacking?

According to Hackerbits:

“Cryptojacking is defined as the secret use of your computing device to mine cryptocurrency.”

Previously, cryptojacking involved a victim unknowingly installing a piece of Malware onto their device that would then secretly mine cryptocurrencies. However, now hackers are using in-browser cryptojacking where they use JavaScript on a web page to mine for cryptocurrencies. Popular BitTorrent site Pirate Bay experimented with it at one point, and a cryptojacking program has recently been found in a popular Chrome extension for Tumblr.

How Tesla was Hacked

Tesla
The report, published by the security firm RedLock, shows that the Tesla breach wasn’t that different from other major hacks that have occurred.

The researchers were able to gain access using an Amazon web service that allows Tesla to manage many cloud accounts at once. It is one of many open-source plug-ins that allow entry without a password or other protection.

One of the reasons these attacks are so harmful is that the miners are excellent at covering their tracks. In this case, the attackers used the Stratum mining service then obscured their IP addresses and didn’t take up too much of Tesla’s CPU resources — avoiding suspicion.

There is some good news for users in the fact that the hack did not involve a data leak. Instead, it simply allowed researchers to use the spare computing power for Tesla’s cloud to get some free cryptocurrency. However, cryptojacking can slow users computers while simultaneously draining the battery and costing users a fortune in power bills.

Tesla released the following statement after news of the hack was published:

“We maintain a bug bounty program to encourage this type of research, and we addressed this vulnerability within hours of learning about it. The impact seems to be limited to internally-used engineering test cars only, and our initial investigation found no indication that customer privacy or vehicle safety or security was compromised in any way.”

Problem solved?

Redlock notified Tesla as soon as they found the breach and reported that the issue was quickly rectified. However, cryptojacking attacks are getting more sophisticated as the value of cryptocurrencies continues to soar. Hackers are taking the time to ensure they are breaching the first line of defense that companies have employed.

Redlock suggests that organizations should monitor configurations, network traffic, and suspicious user behavior to identify weak spots in their security systems.

Cover Unsplash

Posted In: Technology
Invest with AMFEIX

Like what you see? Subscribe to CryptoSlate

Get our daily newsletter containing the top blockchain stories and crypto analysis straight to your inbox.

Sign up to stay informed
Aliesha Duffin

Aliesha is a digital marketer, freelance writer, and blockchain enthusiast. She just finished working for one of Vietnam's first blockchain and development research companies. She is excited to see where blockchain technology will go in the future, especially when it comes to transparency in supply chains.

View author profile

Disclaimer: Our writers' opinions are solely their own and do not reflect the opinion of CryptoSlate. None of the information you read on CryptoSlate should be taken as investment advice, nor does CryptoSlate endorse any project that may be mentioned or linked to in this article. Buying and trading cryptocurrencies should be considered a high-risk activity. Please do your own due diligence before taking any action related to content within this article. Finally, CryptoSlate takes no responsibility should you lose money trading cryptocurrencies.