Fake Charging Station WiFi Used by Researchers to Hack into and Steal Teslas

Tesla owners need to be cautious when connecting to WiFi networks at Tesla charging stations as researchers have discovered a potential way for hackers to steal their cars. In a YouTube video, security researchers Tommy Mysk and Talal Haj Bakry of Mysk Inc. demonstrated how they used a fake Tesla WiFi network to trick Tesla owners into providing their login information, allowing the hackers to set up a new phone key and potentially steal the vehicle. The process involves creating a duplicate “Tesla Guest” WiFi network using a hacking tool called Flipper Zero, and then luring victims to a fake Tesla login page to steal their credentials. Once the hackers have access to the owner’s Tesla account, they can use it to set up a new phone key and gain control of the vehicle.

## Introduction

Tesla owners need to be cautious when connecting to WiFi networks at Tesla charging stations as researchers have discovered a potential way for hackers to steal their cars. In a YouTube video, security researchers Tommy Mysk and Talal Haj Bakry of Mysk Inc. demonstrated how they used a fake Tesla WiFi network to trick Tesla owners into providing their login information, allowing the hackers to set up a new phone key and potentially steal the vehicle. The process involves creating a duplicate “Tesla Guest” WiFi network using a hacking tool called Flipper Zero, and then luring victims to a fake Tesla login page to steal their credentials. Once the hackers have access to the owner’s Tesla account, they can use it to set up a new phone key and gain control of the vehicle.

## Potential Vulnerability Exploited

Tommy Mysk and Talal Haj Bakry used a social engineering approach to exploit a potential vulnerability in Tesla’s security system. By creating a fake WiFi network at Tesla charging stations, they were able to deceive Tesla owners into providing their login credentials, including username, password, and two-factor authentication code. The researchers used a hacking tool called Flipper Zero to set up the fake network and a duplicated Tesla login page to steal the information from unsuspecting victims. This method allowed them to gain access to the Tesla owner’s account and set up a new phone key, granting them control over the vehicle.

## Implications of the Attack

The implications of this hacking method are significant, as it exposes a potential flaw in Tesla’s security system that could be exploited by malicious actors. Once hackers have access to the owner’s Tesla account, they can remotely unlock and steal the vehicle using a new phone key set up through the stolen credentials. Additionally, the victim is not notified when a new phone key is created, allowing the hackers to operate without raising suspicion. This attack highlights the importance of implementing additional security measures, such as physical key card authentication and notification alerts for new phone key setups, to prevent unauthorized access to Tesla vehicles.

## Tesla’s Response and Future Solutions

Despite reporting the issue to Tesla, the company responded that it investigated and determined it was not a security concern, according to Tommy Mysk. However, Mysk suggested that requiring physical key card authentication and notifying owners of new phone key setups could mitigate the risk of unauthorized access to Tesla vehicles. These solutions could enhance Tesla’s security measures and protect owners from potential hacking attacks. By addressing these vulnerabilities, Tesla can strengthen its security system and ensure the safety and privacy of its customers.

## Conclusion

The social engineering attack demonstrated by Tommy Mysk and Talal Haj Bakry raises concerns about the security of Tesla vehicles and the susceptibility of Tesla owners to hacking threats. By exploiting a loophole in the Tesla WiFi network at charging stations, hackers can gain unauthorized access to Tesla accounts and potentially steal vehicles using a new phone key setup. It is crucial for Tesla to address these vulnerabilities and implement additional security measures to protect its customers from cyber threats. As technology continues to advance, companies must prioritize cybersecurity and stay ahead of potential risks to safeguard user data and prevent malicious attacks.

Share This Article