ariMarketing News
Sunday, June 1, 2025
Want Traffic?
  • Home
  • Entrepreneurship
  • Marketing
    • Digital Marketing
    • Mobile Marketing
    • Content Marketing
    • B2B Marketing
    • B2C Marketing
    • Email Marketing
    • Video Marketing
  • Social Media
  • SEO
  • AI
  • Graphic Design
  • PR
  • Videos
  • More
    • Sales Conversion
    • Website Development
    • Traffic/Lead Generation
No Result
View All Result
  • Home
  • Entrepreneurship
  • Marketing
    • Digital Marketing
    • Mobile Marketing
    • Content Marketing
    • B2B Marketing
    • B2C Marketing
    • Email Marketing
    • Video Marketing
  • Social Media
  • SEO
  • AI
  • Graphic Design
  • PR
  • Videos
  • More
    • Sales Conversion
    • Website Development
    • Traffic/Lead Generation
No Result
View All Result
ariMarketing News
No Result
View All Result
  • Marketing
  • Social Media
  • SEO
  • Entrepreneurship
  • AI
  • Graphic Design
  • Public Relations
  • Sales Conversion
  • Website Development
  • Traffic/Lead Generation
  • Videos
Home Entrepreneurship

This Hacker Exposed A New Way to Steal a Model Y Tesla

September 16, 2022
in Entrepreneurship
106 4
A A
0
21
SHARES
690
VIEWS
Share on FacebookShare on Twitter

Based on a recent Tesla hack, it might be time to upgrade your purse, wallet, and key protection.

In August, Josep Pi Rodriguez, an “ethical hacker” and principal security consultant at IOActive, published a whitepaper on how to hack a Model Y, as reported in The Verge.

The paper showed how two people could use a couple of devices, including a Proxmark RDV4 (which you can get online for $340, but there are significantly cheaper versions on sites like Amazon you could use, Rodriguez said) to break into a Model Y Tesla.

Rodriguez, who is based in Madrid, told Entrepreneur that this car hack is innovative compared to past hacks because using a Proxmark — something anyone could buy online and use as long as they had the coding skills to write their own firmware for it — is new, he estimated.

“This is the first working NFC relay attack against a Tesla Model Y,” he said.

“This device has been never been used, at least in public, for this kind of attack,” Rodriguez added.

But the hacking doesn’t just have implications for Tesla owners.

It reveals new vulnerabilities — and highlights old ones — for a host of other tap-to-unlock car keys, cards, or fobs and tap-to-pay cards that use NFC, or near-field communication, says Sanjay Deo, chair of the Levan Center of Innovation Cybersecurity Advisory Council and president of 24by7 Security.

“I think everybody should understand this paper and understand the risks,” Deo told Entrepreneur.

How the Model Y Tesla Hack Happened

Rodriguez’s research whitepaper outlines how two people could hack into a Model Y Tesla.

For background, a Tesla fob, card key, or phone app (like many other digital car unlockers) has a conversation with the car to confirm the key placed near it is the one that is supposed to unlock the car.

Rodriguez showed how hackers could intercept that car-to-key conversation.

First, one person would take the Proxmark device, which is essentially a radio transmitter and identifier, and get close to someone’s Tesla.

Then, another person goes near the owner’s keycard or phone app with any NFC-enabled device (even just a smartphone). As The Verge points out, that could happen while you’re outside moving around or waiting in a line for coffee or at a table for food.

The two devices, with the help of WiFi or Bluetooth, can then relay the conversation that the Tesla key would normally have with the car, to the car, to get the door to open.

In the paper, Rodriguez demonstrated it at a short distance, but he theorized it could be done over a long way.

You could be traveling, and someone could get near you with the device and unlock your car at the airport in Miami, for example, Deo said.

“[You] wouldn’t even know the car is not there,” he said. “It’s a pretty sophisticated hack.”

That is part of why this attack is concerning, even though NFC hacks had previously been a concern in the car industry, the paper notes.

“This is becoming a unique NFC attack, and that is why it’s getting so much attention,” Deo said. “If you could do it on Tesla, you could do it on other cars that have this NFC protocol.”

When it comes to driving the car, Rodriguez told The Verge that hackers would have to go through the process a second time to make another key to start the car again (or just sell the car’s parts).

How to protect yourself

Having your cards scanned in public has long been a risk, Deo said (though it’s not as cost-effective or easy as just stealing them online). Rodriguez had recommendations for how Tesla could fix the issue. For the general consumer, it could come down to one major thing: RFID blocking material, Deo advised.

This lining would block scanners of various types from scanning your Tesla key or regular credit cards. Consumers could also protect the car from being driven off, at least, by enabling PIN-to-drive on their Teslas, Rodriguez said. (Though many cars do not have this option, he told The Verge).

You can also get RFID blocking phone cases, he added.

Tesla did not immediately respond to Entrepreneur’s request for comment.

Rodriguez disclosed the vulnerability to the company and said Tesla said the PIN feature would fix it. He told The Verge that he thought Tesla “downplayed” the risk, the outlet wrote.

“This feature is optional, and Tesla owners who are not aware of these issues may not be using it,” Rodriguez wrote in the paper.

Read the full article here

Tags: Business NewsNews and TrendsTesla

Subscribe to our mailing list to receives daily updates!

We won't spam you

Previous Post

Dealing With Pricing Objections

Next Post

How To Become a Digital Marketing Consultant & Get Clients

Related Posts

Old Navy shows off activewear with Lindsay Lohan in ‘80s-inspired spot
Entrepreneurship

Old Navy shows off activewear with Lindsay Lohan in ‘80s-inspired spot

May 30, 2025
Sprite targets ads around scorching temps for global summer campaign
Entrepreneurship

Sprite targets ads around scorching temps for global summer campaign

May 29, 2025
Marketing to Gen Alpha: How brands can win over the next generation
Entrepreneurship

Marketing to Gen Alpha: How brands can win over the next generation

May 29, 2025
E.l.f. sets sail with viral TikToker Oliver Widger
Entrepreneurship

E.l.f. sets sail with viral TikToker Oliver Widger

May 28, 2025
YouTube spotlights how brands can own cultural moments at ad showcase
Entrepreneurship

YouTube spotlights how brands can own cultural moments at ad showcase

May 15, 2025
Knorr dupes fast food favorites with Martha Stewart in social-first push
Entrepreneurship

Knorr dupes fast food favorites with Martha Stewart in social-first push

May 14, 2025
Leave Comment

Subscribe to our mailing list to receive updates and special offers!

We will NOT span you!

Check your inbox or spam folder to confirm your subscription.

Latest Articles

Kinder Chocolate lets kids’ imaginations run wild in new campaign

Kinder Chocolate lets kids’ imaginations run wild in new campaign

May 30, 2025
Droga departs Accenture Song CEO post at fluid moment for creativity

Droga departs Accenture Song CEO post at fluid moment for creativity

May 28, 2025
Artificial Intelligence in Enterprise Service Management: What to Expect in 2025

Artificial Intelligence in Enterprise Service Management: What to Expect in 2025

May 27, 2025
In a world of tariffs and turmoil, marketing’s insight is a superpower

How tariffs are reshaping long-term strategies for brands and buyers

May 27, 2025
Coke pushes Gen Z to ditch digital noise and embrace summer fun

Coke pushes Gen Z to ditch digital noise and embrace summer fun

May 27, 2025

Latest Marketing and Entrepreneurship news and articles from the most trusted sources, follow us to get the latest news and tips directly to your inbox.


Learn more

Sections

  • Artificial Intelligence
  • B2B Marketing
  • B2C Marketing
  • Content Marketing
  • Digital Marketing
  • Email Marketing
  • Entrepreneurship
  • Graphic Design
  • Mobile Marketing
  • Public Relations
  • Sales Conversion
  • SEO
  • Social Media
  • Traffic/Lead Generation
  • Uncategorized
  • Video Marketing
  • Videos
  • Website Development

Newsletter

Subscribe to our mailing list to receive updates and special offers!

We will NOT span you!

Check your inbox or spam folder to confirm your subscription.

  • Privacy
  • Terms
  • Press Release
  • Advertise
  • Contact

© 2022 ariMarketing - All rights reserved.

No Result
View All Result
  • Home
  • Entrepreneurship
  • Marketing
    • Digital Marketing
    • Mobile Marketing
    • Content Marketing
    • B2B Marketing
    • B2C Marketing
    • Email Marketing
    • Video Marketing
  • Social Media
  • SEO
  • AI
  • Graphic Design
  • PR
  • Videos
  • More
    • Sales Conversion
    • Website Development
    • Traffic/Lead Generation

© 2022 ariMarketing - All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.