Skip to main content

Hackers Take Control of Tesla’s Cloud Account To Mine Cryptocurrency

While Elon Musk might be busy making plans to take humans to Mars and impress people with SpaceX’s upcoming internet satellite launch, notorious hackers don’t know how to take a break.
As detected by cloud security firm RedLock, the hackers were able to take control of Tesla’s poorly secured public cloud account to mine cryptocurrency. The hackers infiltrated Kubernetes console of Tesla, which didn’t have any password protection. Well, they can claim that it would be unfair to blame them entirely.
With the help of one Kubernets pod, they were able to access Tesla’s AWS account containing important telemetry data. Hackers also used one pod to perform cryptocurrency mining.
Unlike the usual mining methods, hackers installed mining pool software and configured the mining script in such a way that standard security means failed to spot the malicious activity.
Moreover, they also used CloudFlare to hide the true IP of the mining pool, making the detection process more challenging. The software was configured to keep the CPU usage low to avoid detection.
RedLock CSI team had informed Tesla, and the issue has been resolved.
This was not a single instance. Earlier, the firm found hundreds of other Kubernetes consoles accessible over the internet without any password. Some of these instances belonged to Avia, an insurance company, and Gemalto, world’s largest SIM card manufacturer.
YOU MAY ALSO LIKE:

Comments

Popular posts from this blog

[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks

Recently uncovered two huge processor vulnerabilities called Meltdown and Spectre have taken the whole world by storm, while vendors are rushing out to patch the vulnerabilities in its products. The issues apply to all modern processors and affect nearly all operating systems (Windows, Linux, Android, iOS, macOS, FreeBSD, and more), smartphones and other computing devices made in the past 20 years. What are Spectre and Meltdown? We have explained both, Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715), exploitation techniques in our previous article. In short, Spectre and Meltdown are the names of security vulnerabilities found in many processors from Intel, ARM and AMD that could allow attackers to steal your passwords, encryption keys and other private information. Both attacks abuse 'speculative execution' to access privileged memory—including those allocated for the kernel—from a low privileged user process like a malicious app running...

Check your Gmail Account Email is Secured or Not After 50 Lacs Gmail account Hacking

World Biggest Hacking 50Lacs Gmail Account Hacked by Russian Hackers. Hack Gmail List Post in Bitsec security forum. This hacking is done in 10 September 2014. Anyone can download  5 Million hacking gmail  list . Your password is compromised publicaly.  So how do you know your account is hacked is or not. This is one of the biggest hack in Gmail account.  So hackers use your gmail account password in illegal purposes. So I recommend you to check your gmail account password. Here we provide a website to check your email in the hacking list. If your name in the hacking list ,so change your password of gmail. Check your name in Gmail Hacking list  Follow the given steps. 1 Go to this website  ISLEAKED.COM  or  haveibeenpwned.com/ 2. Type of email and click on check it. 3. Now you know your account is hacked or not. YOU MAY ALSO LIKE : Make Fake FB Account in 1 Min Without Mobile and email Facebook Moves To Decide What ...

Unlocked phones vs. locked phones: Why you should care

Should you get an unlocked phone? The US wireless market is more competitive than ever, which is great news for consumers who have lots of choices when it comes choosing a service provider. But one barrier still exists when trying to switch carriers: the locked smartphone. The end of wireless contracts marked a watershed trend for consumers because it finally opened the door for them to more easily shop around for alternative wireless carriers. But the software locks that carriers put on phones restricting its use on other networks still prevent many consumers from having total freedom when it comes to choosing a provider. Now Verizon, the only wireless carrier that sold its phones unlocked out of the box, is reversing course. The company  said earlier this week  it would begin locking the phones it sells to consumers for an undetermined period of time, which will prevent them from using a SIM card from another carrier. But Verizon promised it would eventually ...