Tesla electric car’s security features turn out to be easy to hack using Bluetooth technology

Liputan6.com, Jakarta – Millions of digital keys around the world, including those built into Tesla electric cars, can be unlocked remotely by hackers exploiting vulnerabilities in Bluetooth technology. This one, confirmed by a cybersecurity company, was seized ReutersWednesday (5/18/2022).

In a shared video, NCC Group researcher Sultan Qasim khan is able to open and then drive a Tesla using a small relay connected to a laptop computer. In this way, to bridge the huge gap between Tesla’s electric cars and owners’ phones.

“This proves that any product that relies on a reliable BLE connection is vulnerable to attack, even from other parts of the world,” the company wrote in a statement referring to the Bluetooth Low Energy (BLE) protocol, the technology used for million cars. and smart locks.

Although Khan demonstrated the hack on the 2021 Tesla Model Y, the NCC Group said any smart lock that uses BLE technology, including smart locks in enclosures, can be unlocked the same way.

Meanwhile, Tesla itself did not respond to a request for comment on the matter.

The NCC Group said that these vulnerabilities are different from traditional bugs that can be fixed with software patches, and that the BLE-based authentication that was added was not originally designed for use in mechanisms locking.

“As a result, the systems people rely on to protect their cars, homes, and personal data use Bluetooth proximity authentication mechanisms that can be easily broken with inexpensive hardware,” the company said.

* Fact or hoax? To know the veracity of the information circulating, please WhatsApp at the number Liputan6.com Fact Check 0811 9787 670 by simply typing the desired keyword.

Elon Musk only wore T-shirts when he met Jokowi

Jordan Carlson

"Zombie geek. Beer trailblazer. Avid bacon advocate. Extreme introvert. Unapologetic food evangelist. Internet lover. Twitter nerd."

Leave a Reply

Your email address will not be published. Required fields are marked *