Tesla responds to Model S hacking

By / 8 years ago / News / No Comments

The senior researchers from Keen Security Lab were able to hijack the car from up to 20km away (12 miles) to activate brakes, unlock doors, and fold mirrors.

The hackers, Sen Nie, Ling Liu, and Wen Lu, along with director Samuel Lv, said they were also able to hijack the Tesla’s control screen.

After contacting Tesla with their findings, the carmaker deployed an over-the-air software update (v7.1, 2.36.31) that addressed the security issues.

Tesla said: “The issue demonstrated is only triggered when the web browser is used, and also required the car to be physically near to and connected to a malicious Wi-Fi hotspot. Our realistic estimate is that the risk to our customers was very low, but this did not stop us from responding quickly.”

It added: “We engaged with the security research community to test the security of our products so that we can fix potential vulnerabilities before they result in issues for our customers. We commend the research team behind today’s demonstration and plan to reward them under our bug bounty program, which was set up to encourage this type of research.”

Brian Spector, CEO of cyber security firm MIRACL, also commented on the hacking, saying: “These hacks demonstrate the serious problems around identity verification in today’s connected cars. Having very limited encryption, identity management and data protection within such a powerful computer is extremely dangerous and poses a real and serious threat to everyone using our roads today. Move forwards to the increasing trend for driverless cars, and the potential fallout from this lack of authentication becomes even more frightening.

“For connected cars to become more secure, relationships must be established within each and every component within a vehicle, to ensure that only a legitimate operator can control the connected devices within a car. Given the huge number of components in connected cars, hackers usually find a pathway by following a ‘weakest link’ scenario which attacks the easiest point of entry to the vehicle. This problem is compounded by the array of parts that comprise a vehicle, and the lack of a security protocol that ensures they will all work together safely and securely.

“The current security checks often fail because they rely on slow, centralised identity verification services. To connect the components more quickly and autonomously, manufacturers should deploy a distributed trust model which allows for fast pre-authorisation, and removes the roadblock of a centralised service.”

For more of the latest industry news, click here.

Natalie Middleton

Natalie has worked as a fleet journalist for nearly 20 years, previously as assistant editor on the former Company Car magazine before joining Fleet World in 2006. Prior to this, she worked on a range of B2B titles, including Insurance Age and Insurance Day. Natalie edits all the Fleet World websites and newsletters, and loves to hear about any latest industry news - or gossip.

Leave a comment

You must be logged in to post a comment.