Security slip lets crims locate, unlock Tesla model S roadster

Security slip lets crims locate, unlock Tesla model S roadster

Web app for $200,000 car lacks second factor authentication.

Criminals have a new vector of attack to steal the $200,000 Tesla model S car thanks to security risks that permit unlimited log in attempts of online control panels and effective phishing of passwords.

Among the security risks identified is the ability for hackers to continuously enter passwords without restriction into the car's web login panel which allows a model S to be remotely located and unlocked.

Security across network-capable cars such as the model S was consistently found to be slack, and if it did not improve, botnets may in the future target vehicles, possibly tracking and attacking fleets, the researcher who found the flaws hypothesised.

Hackers could brute-force the passwords for the model S login page -- in which scores of combinations were entered against a given username without interruption -- because Tesla did not employ any second-factor authentication such as tokens or apps such as the Google Authenticator. 

This was perhaps the most risky vector of attack because it meant drivers and Tesla staff, who could unlock customer cars, could be targeted in cunning spear phishing attacks aiming to steal passwords.

If usernames and passwords were lost, there would be no security mechanism preventing attackers from logging in and potentially stealing cars.

"Users have a tendency to re-use their credentials on other services as well," researcher Nitesh Dhanjani (@nitesh_dhanjani) saidTesla's iOS app

"This creates a situation where an attacker that has compromised a major website can attempt to try the same password credentials on Tesla website and iPhone app."

This process could be easily automated to target multiple cars.

Tesla was discreetly contacted by the researcher but has not commented.

Dhanjani had also found three IP-enabled devices in his Tesla model S which may have been the cars' dashboard and console which had risky exposed network services including SSH and HTTP.

Much work has been done in examining the security architectures of cars. The most famous of these was the many months of work research duo Charlie Miller and Chris Valasek spent tearing apart and hacking a Toyota Prius and Ford Escape to control its breaks and other functions.

The two were icons in a burgeoning scene of academics and security boffins who along with a thriving but fragmented assortment of rev-head hobbyist geeks are battering the digital fabric powering modern-day cars.

A lot of hacking was focused on Controller Area Networks (CANs) embedded into many cars in use today. This allowed alarms, speedos, brakes and door locks to be altered, but provided for legitimate uses including modifying fuel injection and monitoring precise performance.

Source: Copyright © PC & Tech Authority. All rights reserved.

See more about:  tesla  |  security  |  infosec  |  phishing  |  car  |  auto  |  security risks  |  nitesh dhanjani
 
 

Readers of this article also read...

Real world 3D: History is being scanned in 3D, from sites in war zones to a 126-year-old peanut 

Real world 3D: History is being scanned in 3D, from sites in war zones to a 126-year-old peanut

 
Call of Duty goes full sci-fi with Infinite Warfare's space combat 

Call of Duty goes full sci-fi with Infinite Warfare's space combat

 
In the game of thrones, you win or you die - and Foxtel will lose 

In the game of thrones, you win or you die - and Foxtel will lose

 
EA will reveal the next Battlefield game on 6 May 

EA will reveal the next Battlefield game on 6 May

 
Nintendo NX arrives March 2017, bringing Zelda along for the ride 

Nintendo NX arrives March 2017, bringing Zelda along for the ride

 
Latest articles on BIT Latest Articles from BIT
Norton releases mobile VPN app
30 Jun 2016
Norton Wi-Fi Privacy is a simple way to secure Android and iOS devices when using public Wi-Fi ...
Google just made two-step authentication a lot easier
23 Jun 2016
No more SMS or email codes – you can now sign into Google sites with one phone tap.
Does Mark Zuckerberg put tape over his webcam?
23 Jun 2016
The Facebook boss appears to use a low-tech way of protecting his privacy.
New budget security camera has a 180-degree lens
9 Jun 2016
D-Link’s DCS-2630L captures natural-looking wide-angle images, allowing one camera to ...
Xero offers two-step authentication
7 Jun 2016
The cloud accounting system makes it harder for the bad guys to steal your business data.

Latest Comments

From our Partners

PC & Tech Authority Downloads