Tesla cars can be hacked using andriod apps
Homehackingtech

Tesla cars can be hacked using andriod apps

SHARE:

Security researchers demonstrate new vulnerabilities
Hacking a Tesla is a thing we’ve seen before, but this time a team of security researchers at company Promon managed to locate, unlock, and steal a car using just an Android app.

Every Tesla model comes with a companion smartphone application for Android and iOS that allows owners to do basic things such as checking the battery level and the charging status, locate the vehicle, and flash the lights to find it in the parking lot.

And while these certainly come in handy, they can also be used by hackers to drive away by simply compromising the Android application.

First and foremost, it’s essential to note that no hack can occur unless Tesla car owners download and install a malicious application on their Android phones. This is absolutely mandatory and it’s a confirmation that if you care about your security and don’t download suspicious files, it’s pretty hard to get hacked.

Beware the “free burgers”

In order to trick Tesla owners into downloading the app, hackers used a simple incentive such as a free burger. They created a free and open Wi-Fi hotspot in the proximity of a Tesla charging station and advertised the app on connected phones, claiming that owners can receive a free burger if they install it.

Supposing the Tesla owner install this malicious app, hackers can then connect to the phone and prepare the hijack. Promon says that the Tesla companion app is granted an OAuth token when connecting the Tesla server with a username and password.
“The first time the user logs into the Tesla app, the token is obtained and then stored in cleartext in a file in the app’s sandbox folder. When the app is restarted, the token is read and used for subsequent requests,” the security researchers explain.
The next step is to reset this token, which in turn would prompt users to input the username and password for the app once again. To do this, attackers only have to remove the token completely, so when Tesla owners provide the username and password, hackers can intercept the data and use it to authenticate in the app.

What comes next is not hard to imagine. With hackers getting full access to the Tesla companion app, they can locate the car and even enable the keyless driving functionality that makes it possible to drive it without a key.

What’s also important to note is that this isn’t a vulnerability in Tesla cars themselves, but a glitch in mobile apps that could be used by attackers to steal the vehicles. Researchers explain that this only shows the risks of having objects controlled by smartphone apps, and recommend users to update their systems and apps and to always, but always avoid downloading apps coming from untrusted sources.

Name

2016,2,2017,1,360degree,1,360video,1,4k,1,5g,1,8K,1,A series,1,account,2,adobe,1,ads,2,aerial,1,altaba,1,ambassador,1,andriod,30,android,2,antivirus,3,Apple,53,apple watch,1,Apps,34,appstore,1,arrest,1,assassin creed 3,1,atm,1,attack,3,audio,1,backdoor,1,backup,1,ban,3,bank,4,battery,4,best of 2016,2,beta,1,bitcoins,1,bittorrent,8,block,1,bluetooth,1,britney spear,1,browser,8,business,2,bypass,1,callofduty,1,camera,1,cars,1,cash,1,cellebrite,1,CES2017,3,charge,1,china,2,chrome,2,CIA,1,cocacola,1,commandprompt,1,complaint,1,connection,2,copyright,2,cortana,1,crash,1,crime,3,cyanogen,1,cyberlocker,1,D-link,1,darkweb,1,dash charge,1,database,1,databeach,5,ddos,6,deadpool,1,death,1,dell,2,denuvo,1,design,1,desktop,1,dji,1,dmca,2,dns hijacking,1,domain,1,doom,1,download,1,downloader,2,drone,3,durable,1,dvdvideosoft,1,edge,1,eset,1,ex.ua,1,expert,1,explode,3,exploit,1,extratorrent,2,facebook,11,fake,3,fbi,1,FDA,1,findmyiphone,1,fireEye,1,firefox,2,FTC,1,g6,1,gadget,11,galaxy A5,1,galaxy A7,1,galaxy C5,1,game,19,game of throne,1,gaming,2,Gear s2,1,Gear s3,1,giveaway,1,google,28,google playstore,1,hacker,5,hacking,75,hangouts,1,history,1,htc,1,htc 10,1,huawei,3,hyperloop,1,illegal,3,imax,1,imessage,1,improvement,1,india,3,information,1,inspire2,1,instagram,3,intel,1,internet,19,ios,28,ios 10.2,1,iphone,33,iphone 7s,1,iphone6,4,iphone6plus,3,iphone6s,4,iphone7,2,iphone7plus,3,japan,1,kapustkiy,1,kaspersky,3,keyboard for andriod,1,kickass,1,killer,1,laptop,1,latest,13,leak,11,lg,2,limes audio,1,linkedln,2,linux,3,live video,1,lottery,1,lynda,1,mac,1,macbook,5,malware,10,medical report,1,microsoft,43,money,1,monitor,1,movie,1,Music,5,nasa,2,navy,1,netflix,4,network,1,news,2,nintendo,2,noaa,1,nokia,4,nokia 6,1,north korea,1,note5,1,note7,5,nougat,7,nsa,1,office,1,oneplus,4,oneplus 3,1,oneplus 3T,1,oneplus4,1,online,1,os,5,ourmine,2,pacemaker,1,password,2,patch,1,pc,2,periscope,1,photography,2,picture,1,piracy,7,pirate,6,pirate bay,6,pixel,6,pixel xl,1,pizza,1,playstation,4,playstore,3,pokemon go,1,police,1,powershell,1,prisma,1,prison,1,privacy,2,project Valerie,1,Projector,1,protection,1,prototype,1,putlocker,1,qualcomm,1,ransomware,2,raspberrypi,1,rating,1,razer,1,recall,6,red star,1,redstone,1,refund,1,remove,1,rename,1,review,2,rumors,4,russia,7,s6,1,s6edge,1,s7,1,s7edge,2,samsung,27,satelite,1,searchengine,1,security,34,selfie,1,server,1,shadow broker,1,shutdown,8,siri,1,skippable,1,skype,1,smartphone,101,socialnetwork,11,software,1,sony,5,space,2,sqlinjection,1,stolen,1,supercomputer,1,supermario run,2,support,1,system,2,tabs2,1,tango,1,target,1,tech,53,Technology Explained,4,tesla,1,the mummy,1,tools,1,torrent,10,torrent site,1,track,1,trademark,1,TV show,1,twitter,5,ubisoft,2,uk,4,unlock,1,upcoming,1,update,22,us,5,usbkiller,1,users,1,USTR,2,vespa,1,video,4,videoplayer,1,vines,1,visualstudio,1,vlc,1,VR,3,vulnerability,15,vulnrrability,1,warning,1,watchdog2,1,website,2,what.cd,2,whatsapp,1,wifi,3,wikileaks,1,windows,33,windows10,5,wireshark,1,xbox,4,xiaomi,1,xperia,2,yahoo,1,youtube,5,youtubekids,1,
ltr
item
MOUNT TECH: Tesla cars can be hacked using andriod apps
Tesla cars can be hacked using andriod apps
tesla cars hacked
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4Ao0EkUuRWY0t-aGr3f_dbwkP2NopE3-iHcqf6yO6jjc2OIzU9KmjG9QgymZHboq9PoXChzs5dv8wA07goZ0hUR5xuZ3trv-XKuJjrl6PEkVTFBiG6Trk85KRRIZjUtR-k-XftNO0wB0T/s1600/tesla-cars-can-be-hacked-using-andriod-apps.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4Ao0EkUuRWY0t-aGr3f_dbwkP2NopE3-iHcqf6yO6jjc2OIzU9KmjG9QgymZHboq9PoXChzs5dv8wA07goZ0hUR5xuZ3trv-XKuJjrl6PEkVTFBiG6Trk85KRRIZjUtR-k-XftNO0wB0T/s72-c/tesla-cars-can-be-hacked-using-andriod-apps.jpg
MOUNT TECH
http://mount-tech.blogspot.com/2016/11/tesla-cars-can-be-hacked-using-andriod-apps.html
http://mount-tech.blogspot.com/
http://mount-tech.blogspot.com/
http://mount-tech.blogspot.com/2016/11/tesla-cars-can-be-hacked-using-andriod-apps.html
true
5023700227490855537
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy