Tesla cloud account hijacked to mine cryptocurrency

For story suggestions or custom animation requests, contact [email protected] Visit http://archive.nextanimationstudio.com to view News Direct's complete archive of 3D news animations.

RESTRICTIONS: Broadcast: NO USE JAPAN, NO USE TAIWAN Digital: NO USE JAPAN, NO USE TAIWAN
Researchers at a cloud-monitoring firm discovered that cyber criminals had accessed Tesla's account and were using it to mine cryptocurrency.

Fortune reports that unidentified hackers accessed an unprotected Kubernetes console owned by Tesla, and obtained login credentials to the company's Amazon Web Services cloud.

They gained entry to the account using the login credentials, in the process exposing sensitive data stored inside about Tesla's test cars.

The hackers than installed crypto mining software, which ran scripts that allowed them to mine cryptocurrency. In order to avoid detection, the intruders deliberately reduced CPU usage and masked their IP addresses.

RedLock, the firm that discovered the breach, notified Tesla of the breach on January 30.

Tesla has since resolved the issue, and reportedly found no indication that customer privacy or vehicle safety and security were compromised.


RUNDOWN SHOWS:
1. Hackers obtain login credentials from Tesla's unprotected Kubernetes console
2. Hackers access Tesla's AWS cloud, which contains data on test cars
3. Hackers run crypto mining software to generate cryptocurrency
4. Hackers reduced CPU usage, mask IP addresses to hide cryptojacking

VOICEOVER (in English):

"Unidentified hackers accessed an unprotected Kubernetes console owned by Tesla, and obtained login credentials to the company's Amazon Web Services cloud."

"They gained entry to the account using the login credentials, in the process exposing sensitive data stored inside about Tesla's test cars."

"The hackers then installed crypto mining software, which ran scripts that allowed them to mine cryptocurrency."

"In order to avoid detection, the intruders deliberately reduced CPU usage and masked their IP addresses."


SOURCES:
Fortune, PCMag
http://fortune.com/2018/02/20/tesla-hack-amazon-cloud-cryptocurrency-mining/
https://www.pcmag.com/news/359340/cryptocurrency-miner-infiltrates-a-tesla-cloud-server