Hackers hijack Tesla system in fat cryptocurrency attack



Elon Musk: What’s next?

Now Elon Musk has successfully launched the Falcon Heavy, which is the next step for the billionaire entrepreneur?

Tesla has become the latest target of hackers who try to “mine” cryptocurrency, according to the cloud security company RedLock.

RedLock reports that hackers gained access to the Tesla compute resources for the implementation of the so-called “cryptojacking,” where computers are hijacked to mine cryptocurrencies. The mining process includes creating the computing power available to authenticate, for example, bitcoin transactions. The “miners” will receive a financial reward for making the systems available. Digital Trends has compared the mining process to “a bitcoin bank counter.”

While individuals can choose to use their own Pc’s to my cryptocurrency using specialized software, hackers also secretly hijacking computers to steal compute power for the same purpose. They then take advantage of the financial benefits of the cryptocurrency mining.


By the stealing of compute resources, hackers avoid the energy cost of switching the systems that do the work.

The Tesla burglary involved access to a cloud system, in accordance with RedLock. “In this case, the hackers not only gained unauthorized access to non-public Tesla data, but also the steal of the calculation of the available resources in Tesla’ s Amazon Web Services (AWS) environment for cryptojacking,” RedLock said in a statement. “The researchers immediately notified Tesla of his findings, and the vulnerabilities have already been addressed.”

Specifically, the hackers gained access to an administrative console on an open source software that is used by Tesla to manage your applications. This was then used to expose access to the credentials of the company’s AWS cloud, which in turn gave access to non-public Tesla information that is stored on Amazon’s Simple Storage Service (S3).

The Elon Musk-led technology company, told Fox News that hackers only have access to a limited number of data.


“We have a bug bounty’ program for the promotion of this type of research, and we addressed this vulnerability within hours of learning about,” said Tesla, in a statement by e-mail to Fox News. “The impact seems to be limited to the internally used engineering test cars and our initial investigation found no indication that the customer’s privacy or the safety of the vehicle or safety is affected.”

Cryptojacking is increasingly in the news. For example, Hackers recently “invaded” the ads on YouTube to mine cryptocurrency, according to PCMag, steal compute power through the victims ‘ browsers. Other recent cryptojacking targets include a host of the uk websites of the government and, PCMag reports.

In a recent report, anti-malware software company Malwarebytes found that there is a tremendous increase in the malicious use of the so-called “cryptominers” in 2017. “Driven by the cryptocurrency craze, bad actors have begun to make use of cryptomining tools for their own profit, using the victim personal computers in the process,” he said, in a statement. “This includes a significant increase to the miners through hacked websites, malicious spam, exploit kit drops and adware bundlers.


Malwarebytes blocked an average of 8 million “drive-by “mining” attempts per day in September 2017, it said.

Marcin Kleczynski, Malwarebytes CEO, told Fox News that consumers don’t even know that their PC power is harvested than mine cryptocurrency such as bitcoins. “But if you look at your computer, your resources are spiky,” he said.

Follow James Rogers on Twitter @jamesjrogers

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.

Most popular