Researchers remotely hacked Tesla Model S P85 and 75D while the cars were parked as well as while the 75D was moving; an attacker could control the brakes from 12 miles away. Chinese researchers from Keen Security Lab of Tencent announced that they could chain multiple vulnerabilities together, which allowed them to remotely hack the Tesla Model S P85 and 75D from as far as 12 miles away.The researchers said:As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars. We have verified the attack vector on multiple varieties of Tesla Model S. It is reasonable to assume that other Tesla models are affected.The researchers released video proof of remotely hacking the Tesla vehicles while they were parked and while they were being driven. The attacks were carried out on unmodified Tesla cars that had the latest firmware version.If you have eight minutes to spare, I highly recommend you watch it. As the researchers stated, the remote hacks likely work on all Tesla models, but on the parked Model S P85, the researchers remotely opened the sunroof, turned on the turn signal, and changed the position of the driver’s seat.But then Samuel Lv, director of Keen Security Lab, brought in a “brand-new Tesla Model S 75D” to see what the hackers could do. For starters, the researchers locked the touchscreen controls to show a message proving the Tesla was pwned by Keen Security. Then they removed the keys from the parked 75D from the immediate area and instead used a laptop to remotely unlock the door.Then the researchers remotely hacked the car while it was being driven. While the Tesla was moving, the researchers controlled the windshield wipers, popped open the trunk and changed the position of the side view mirrors. This was done by researcher Sen Nie with a laptop via the passenger seat.To prove the brakes could be remotely controlled, the researchers had a colleague in an office about 12 miles away hit the brakes while the Tesla was being driven.Tesla has closed the security holes, and the researchers urged Tesla owners to update to the latest firmware immediately to “avoid potential driving safety risks.”Tesla has released the following statement:Within just 10 days of receiving this report, Tesla has already deployed an over-the-air software update (v7.1, 2.36.31) that addresses the potential security issues. The issue demonstrated is only triggered when the web browser is used, and also required the car to be physically near to and connected to a malicious Wi-Fi hotspot. Our realistic estimate is that the risk to our customers was very low, but this did not stop us from responding quickly.We engaged with the security research community to test the security of our products so that we can fix potential vulnerabilities before they result in issues for our customers. We commend the research team behind today’s demonstration and plan to reward them under our bug bounty program, which was set up to encourage this type of research. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe