探索

【】

字号+作者:囫圇吞棗網来源:熱點2024-10-23 09:24:13我要评论(0)

There's digital gold in them thar computers, and hackers are digging their way in.Tesla is hailed as

There's digital gold in them thar computers, and hackers are digging their way in.

Tesla is hailed as a cutting-edge company known for setting the agenda in its field, but when it comes to being the victim of malicious hackers hijacking its computer resources to mine cryptocurrency, it turns out it's just like everyone else.

SEE ALSO:YouTube ads are the latest ground zero for nefarious crypto mining

According to cloud security company RedLock, Tesla has joined the growing list of companies that have been subjected to what experts call cryptojacking — a practice involving the theft of computer processing power to mine cryptocurrencies like bitcoin or Monero.

Hackers reportedly took control of Tesla’s (non-password protected) Kubernetes console — something that helps to administer a Google-designed "managed environment for deploying containerized applications" — and installed and ran crypto-mining software.

The report leaves some big questions unanswered, such as what mining software was used and what cryptocurrency was being mined. In the past, Coinhive has made a lot of news for mining Monero — the preferred cryptocurrency of criminals as it is seen to offer more anonymity than Bitcoin — on unsuspecting victims' computers. Just recently, Salon announced it would mine Monero on some visitors' computers.

Interestingly, whoever was behind the Tesla hack went to great pains to cover their tracks. According to RedLock, "the hackers had most likely configured the mining software to keep the [CPU] usage low to evade detection." Unexplained spiking CPU usage is often seen as a red flag for potential cryptojacking.

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!

What's more, the attackers also "hid the true IP address of the mining pool server behind CloudFlare, a free content delivery network (CDN) service."

Basically, whoever was behind this really didn't want to get caught (surprise), and had some great tricks up their sleeve to evade detection. Perhaps they just really wanted to combine their love of Tesla and hodling bitcoin?

RedLock reported its discoveries to Tesla, which quickly worked to rectify the situation. It also paid out a small bug bounty to the company, reports Fortune.

“We maintain a bug bounty program to encourage this type of research,” a company spokesperson explained to the publication.

While the security team at Tesla (with RedLock's help) was eventually able to lock this down, there is one type of cryptocurrency mining no amount of security hygiene will be able to stop — using power from the Supercharger network to run a mining rig.

But oh well, you have to start somewhere.


Featured Video For You
Fisker's luxury electric car might be a Tesla killer

TopicsBitcoinCybersecurityTeslaCryptocurrency

1.本站遵循行业规范,任何转载的稿件都会明确标注作者和来源;2.本站的原创文章,请转载时务必注明文章作者和来源,不尊重原创的行为我们将追究责任;3.作者投稿可能会经我们编辑修改或补充。

相关文章
  • 'The Flying Bum' aircraft crashes during second test flight

    'The Flying Bum' aircraft crashes during second test flight

    2024-10-23 08:49

  • 牙齒裂開一條縫怎麽辦

    牙齒裂開一條縫怎麽辦

    2024-10-23 07:31

  • 寶寶吸氣時喉嚨有聲音

    寶寶吸氣時喉嚨有聲音

    2024-10-23 07:27

  • 孕中期可以喝紅糖水嗎

    孕中期可以喝紅糖水嗎

    2024-10-23 07:15

网友点评