Interesting People mailing list archives

Keen Lab hackers managed to take control of Tesla vehicles again


From: "Dave Farber" <farber () gmail com>
Date: Fri, 28 Jul 2017 16:27:41 -0400




Begin forwarded message:

From: the keyboard of geoff goodfellow <geoff () iconia com>
Date: July 28, 2017 at 4:12:20 PM EDT
To: Dave Farber <dave () farber net>, Dewayne Hendricks <dewayne () warpspeed com>
Cc: ip <ip () listbox com>, "Peter G. Neumann" <neumann () csl sri com>
Subject: Keen Lab hackers managed to take control of Tesla vehicles again

Last year, a Chinese whitehat hacker group, the Keen Security Lab at Tencent, managed to remotely hack the Tesla 
Model S through a malicious wifi hotspot.

Tesla quickly pushed a fix through an over-the-air software update, but now the same research group has managed to 
again gain control of Tesla’s vehicles.

The hack involved tricking a Tesla drivers into accessing a malicious website through a wifi hotspot and then install 
their own software in order to gain access to some of the car’s features – more importantly, the braking system.

Tesla’s fix included adding code signing in order to prevent anyone else from uploading software on Tesla’s system, 
but now Keen Lab says that they managed to by-pass the code signing with the latest round of vulnerabilities testing 
on Tesla’s car.

Here they list their new exploit this year:

[SNIP]

https://electrek.co/2017/07/28/tesla-hack-keen-lab/


-- 
Geoff.Goodfellow () iconia com
living as The Truth is True
http://geoff.livejournal.com  




-------------------------------------------
Archives: https://www.listbox.com/member/archive/247/=now
RSS Feed: https://www.listbox.com/member/archive/rss/247/18849915-ae8fa580
Modify Your Subscription: https://www.listbox.com/member/?member_id=18849915&id_secret=18849915-aa268125
Unsubscribe Now: 
https://www.listbox.com/unsubscribe/?member_id=18849915&id_secret=18849915-32545cb4&post_id=20170728162749:373ABB3E-73D3-11E7-BDA8-D5E185156C85
Powered by Listbox: http://www.listbox.com

Current thread: