Tuesday, 20 September 2016

Watch China's Elite White Hat Hackers Pwn a Tesla From 12 Miles Away

A group of Chinese white hat hackers has found a way to hack a Tesla, hitting the brakes on it from 12 miles away.

Keen Team, a renowned security research team, announced the successful hack in a YouTube video late Monday night, announcing on Twitter that they had “pwned Tesla Model S remotely.”

“As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars,” the group wrote in a blog post. “We have verified the attack vector on multiple varieties of Tesla Model S. It is reasonable to assume that other Tesla models are affected.”

Tesla did not immediately respond to a request for comment.

Read more: We Drove a Car While It Was Being Hacked

In the video, the hackers show how they’re able to control several features of the car from a laptop, apparently without physically tampering with the vehicle. The hackers demonstrate how they can open the sunroof, move the seat, swing windshield wipers, fold the rear view mirror and—more worrisome—hit the brakes on a moving car while being 12 miles away.

As cars have become more and more like computers on wheels, security researchers have found ways to hack them. The first demonstrations required physical access to a car’s controls and inner computer. Last year, however, two American researchers were able to remotely hack a Jeep, killing the engine while a Wired reporter was driving it on the highway.

Also in 2015, another couple of American researchers found that they could plug their laptop into a Tesla’s network cable and hack into the car’s controls.

The Keen Team’s demonstration this week, however, is the first time a Tesla has been hacked remotely. And if history is any indication, it might not be the last time hackers pwn smart cars.

Get six of our favorite Motherboard stories every day by signing up for our newsletter.



from Watch China's Elite White Hat Hackers Pwn a Tesla From 12 Miles Away

No comments:

Post a Comment