Get 40% Off
🤯 This Tech Portfolio is up 29% YTD! Join Now to Get April’s Top PicksGet The Picks – Just 99 USD

Group Hacks A Tesla EV: Why It Gets A Free Tesla Model 3 Instead Of Jail Time

Published 24/03/2023, 19:29
Updated 24/03/2023, 20:40
© Reuters Group Hacks A Tesla EV: Why It Gets A Free Tesla Model 3 Instead Of Jail Time

© Reuters Group Hacks A Tesla EV: Why It Gets A Free Tesla Model 3 Instead Of Jail Time

Benzinga - Cybersecurity and hacking is a major concern for companies, especially those in the technology sector or with software that could be impacted.

Hackers were able to hack into an electric vehicle from Tesla Inc (NASDAQ: TSLA), and instead of punishment, they got a prize.

What Happened: With companies knowing hackers can target them and find exploits in software and code, many have turned to offering rewards for those who find problems and bring attention to the company. The U.S. State Department is among the entities that offer rewards to people who identify security threats that can be targeted by hackers.

One of the largest hacking events in the world, Pwn2Own, featured groups competing to find security flaws and exploits in companies' software.

A group successfully hacked into the software of a Tesla Model 3 using a time-of-check time-of-use (TOCTOU) exploit to gain access of the vehicle, as reported by Teslarati. Not all details of the hack were shared publicly due to security concerns.

Synacktiv, a French security company, was the group that completed the successful hack.

Their prize for hacking a Tesla vehicle? The group took home $100,000 and a Tesla Model 3 vehicle.

Related Link: Coinbase Pays Out $250K Bounty To Ethical Hacker Who Prevented Nuking Of Entire Crypto Market

Why It’s Important: Pwn2Own is one of the biggest hacking events in the world and involves some of the biggest and most recognizable companies.

Tesla is not new to the event and has often featured its vehicles at the hacking competition with the goal of finding any security flaws that could exploit its software.

Other products that have been featured at Pwn2Own have included internet browsers like Google Chrome, Microsoft Edge, Apple Safari and Firefox and software like Office 365 Plus and Adobe Reader.

Tesla launched its own bug bounty in 2014 offering incentives to hackers who find flaws in its vehicles.

In 2022, it was highlighted that Tesla vehicles were at risk of being stolen by hackers using near-field communication key cards.

The use of Bluetooth technology for Tesla vehicles instead of keys was also noted as a potential security flaw that could allow vehicles to be stolen.

With the rise of automobiles being connected and having more software inside, the risk of security concerns could also rise. Tesla’s approach to offering incentives for finding security flaws may keep them at lower risk down the road of being exploited by hackers.

Read Next: Multimillionaire Twitter Philanthropist Offers Huge Reward For Whistleblower In SVB Bank Collapse

© 2023 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

Read the original article on Benzinga

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.