Home / Channel / General Tech / Hackers cryptojack Tesla after it leaves AWS account unsecured

Hackers cryptojack Tesla after it leaves AWS account unsecured

The rise in popularity of cryptocurrency alongside its tendency to approach extremely high value has prompted an increase in hacker-based crimes. Just last week, over 4,000 UK government websites were breached in order to force them into mining cryptocurrency and now it seems Tesla is the latest victim as its cloud system has been hijacked to do the very same thing.

Cybersecurity firm RedLock was led to an unsecured Kubernetes container console belonging to Tesla while on its search for the owner of an Amazon Web Services (AWS) account that was left open to the public. Kubernetes is designed by Google to optimise cloud applications, and when left without password protection, can give access to sensitive information as well as control of services.

“In Tesla's case, the cyber thieves gained access to Tesla's Kubernetes administrative console, which exposed access credentials to Tesla's AWS environment,” states RedLock. “Those credentials provided unfettered access to non-public Tesla information stored in Amazon Simple Storage Service (S3) buckets.”

It turns out that peeking at sensitive information wasn’t the attacker’s endgame, however, as it was later discovered that the access had been used to utilise the cloud service’s compute power to mine cryptocurrency, essentially profiting at the original user’s expense.

This all fell under Tesla’s radar thanks to the mining pool software installed by the attacker rather than using public mining pools, alongside redirecting the script to mask the IP of the endpoint, thus not alerting threat detection systems.

Fortunately, the hole has now been plugged and Elon Musk’s company is now in full control of its own compute power, not to mention sensitive data.

RedLock's CTO Gaurav Kumar adds one final message for all savvy internet users in that “security is a shared responsibility: Organisations of every stripe are fundamentally obliged to monitor their infrastructures for risky configurations, anomalous user activities, suspicious network traffic, and host vulnerabilities. Without that, anything the providers do will never be enough.”

KitGuru Says: It isn’t the least bit surprising that cryptocurrency would prompt such a response from the more malicious out there, considering it is simply digital money. The good thing is, it seems that the greater community outweigh those malevolent few and the security of every user is that little bit safer for it.

Become a Patron!

Check Also

Samsung will reportedly replace silicon with glass interposers in 2028

Samsung might be about to change how its foundries produce chips. According to a new …

We've noticed that you are using an ad blocker.

Thank you for visiting KitGuru. Our news and reviews teams work hard to bring you the latest stories and finest, in-depth analysis.

We want to be as informative as possible – and to help our readers make the best buying decisions. The mechanism we use to run our business and pay some of the best journalists in the world, is advertising.

If you want to support KitGuru, then please add www.kitguru.net to your ad blocking whitelist or disable your adblocking software. It really makes a difference and allows us to continue creating the kind of content you really want to read.

It is important you know that we don’t run pop ups, pop unders, audio ads, code tracking ads or anything else that would interfere with the KitGuru experience. Adblockers can actually block some of our free content, such as galleries!