{"id":6361,"date":"2016-09-20T11:17:52","date_gmt":"2016-09-20T15:17:52","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=6361"},"modified":"2017-09-24T20:10:33","modified_gmt":"2017-09-24T14:40:33","slug":"tesla-model-s-was-hacked-remotely","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/tesla-model-s-was-hacked-remotely\/6361\/","title":{"rendered":"Tesla Model S was hacked remotely"},"content":{"rendered":"<div class=\"entry-content\">\n<div>\n<p>Researchers at Chinese security company Keen Lab claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed. After one driver\u2019s interaction with the Internet \u2014 in the video below, it was a search for the nearest charging station \u2014 the researchers were able to compromise the computer system of a Model S and to send some commands into its <a href=\"https:\/\/en.wikipedia.org\/wiki\/CAN_bus\" target=\"_blank\" rel=\"noopener nofollow\">CAN bus<\/a>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2016\/09\/05085702\/tesla-remote-hack-1-1024x672.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13028\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2016\/09\/05085702\/tesla-remote-hack-1-1024x672.jpg\" alt=\"Unmodofied Tesla Model S was hacked remotely\" width=\"1280\" height=\"840\"><\/a><\/p>\n<p>For example, they were able to take over both the multimedia system and the dashboard displays, to open the sunroof, to switch on the turning signals, to move the seat, and to open the doors without using a key. Moreover, they managed to activate the windshield wipers, to fold in the side mirror, and to open the trunk <b>while the car was moving<\/b>.<\/p>\n<p>Finally, they showed that an operator some 12 miles away from the car was able to manipulate the brakes of the moving vehicle.<\/p>\n<p><span class=\"embed-youtube\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/c1XyhReNcHY?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/span><\/p>\n<p>\u201cFollowing the global industry practice on \u2018responsible disclosure\u2019 of product security vulnerabilities, we have reported the technical details of all the vulnerabilities discovered in the research to Tesla,\u201d researchers said. \u201cThe vulnerabilities have been confirmed by Tesla Product Security Team.\u201d They will not disclose any more details about the vulnerabilities until Tesla fixes the issues and advises Tesla owners to update cars\u2019 firmware to the latest version.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at Chinese security company Keen Lab claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed. After one driver\u2019s interaction with<\/p>\n","protected":false},"author":421,"featured_media":6362,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2196],"tags":[627,868,1859,1860,555],"class_list":{"0":"post-6361","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-cars","10":"tag-hack","11":"tag-model-s","12":"tag-remote-hack","13":"tag-tesla"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/tesla-model-s-was-hacked-remotely\/6361\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/cars\/","name":"Cars"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/6361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=6361"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/6361\/revisions"}],"predecessor-version":[{"id":7758,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/6361\/revisions\/7758"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/6362"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=6361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=6361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=6361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}