FacebookInstagramTwitterContact

 

Prepper Medicine: 7 Natural Pain-Relieving Plants           >>           Mayo Clinic Study Reveals Disturbing Impact Of Puberty Blockers On Testicular Development           >>           Why Freeze-Drying Is The Best Food Preservation Method           >>           10 Compelling Reasons To Steer Clear Of Gluten           >>           Only One Royal Has Ever Run The London Marathon           >>           Man Glassed In The Face After Telling Woman She Looked Like She Was 43           >>           You Have To See Travis Kelce's Reaction To Kardashian-Jenner Family Comparison           >>           Buried In The Cat's Paw Nebula Lies One Of The Largest Space Molecules Ever Seen           >>           Apple is launching new iPads May 7: Here's what to expect from the 'Let Loose' event           >>           FCC votes to restore net neutrality protections           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 05:01 AM

Subuh

: 05:11 AM

Syuruk

: 06:29 AM

Doha

: 06:51 AM

Zohor

: 12:32 PM

Asar

: 03:44 PM

Maghrib

: 06:32 PM

Isyak

: 07:42 PM

 



The Business Directory


 

 



Security & Privacy


  Home > Security & Privacy


Intruders 'Borrowed' Tesla's Public Cloud For Cryptocurrency Mining (Updated)


Patrick T. Fallon/Bloomberg via Getty Images

 


 February 21st, 2018  |  10:08 AM  |   1533 views

ENGADGET.COM

 

They also had access to private data.

 

Tesla isn't immune to the plague of cryptocurrency mining hijacks, it seems. Security researchers at RedLock have reported that intruders gained access to Tesla's Kubernetes console (where it deploys and manages containerized apps) without needing a password, exposing the EV brand's login credentials for Amazon Web Services. From there, the attackers both abused Tesla's cloud resources for cryptojacking and accessed private data held in Amazon's S3 service. The culprits were creative, too.

 

While many of these mining attempts rely on a public mining pool, the perpetrators here installed mining pool software an d pointed a script to reach an 'unlisted' destination. The move made it harder to simply block the cryptojacking based on internet addresses. The intruders also masked the address of their mining pool server through CloudFlare, and minimized processor use to avoid giving away its presence.

 

RedLock said it notified Tesla right away when it discovered the breach, and that the automaker has already patched the flaw. It's not clear at this point what private data was involved, although this doesn't necessarily mean customer data. We've asked Tesla for comment on the incident and will let you know if it can share more.

 

There doesn't appear to have been much damage at first glance, but the intrusion continues a recent trend of companies and even militaries leaving sensitive info relatively unprotected. RedLock pointed out that there have been "hundreds" of instances like this at other companies. While the solutions in these cases are sometimes straightforward, that they're necessary at all suggests it'll take a while before companies are diligent about preventing slip-ups like this.

 

Update: Tesla has gotten in touch with the extent of the intrusion. It said it fixed the flaw within "hours," and that the effect appears to be limited to "internally-used engineering test cars." Your personal data should be safe, then. You can read the full statement below.

 

"We maintain a bug bounty program to encourage this type of research, and we addressed this vulnerability within hours of learning about it. The impact seems to be limited to internally-used engineering test cars only, and our initial investigation found no indication that customer privacy or vehicle safety or security was compromised in any way."

 


 

Source:
courtesy of ENGADGET

by Jon Fingas

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

Searing Heat Shuts Schools For 33 Million Children

 2024-04-26 01:35:07

US Economic Growth Slows But Inflation Grows

 2024-04-26 07:36:54