Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Android Malware Used to Hack and Steal a Tesla Car
BleepingComputer.com ^ | November 25, 2016 | By Catalin Cimpanu

Posted on 12/01/2016 10:12:18 PM PST by Swordmaker

Tesla Model S

By infecting a Tesla owner's phone with Android malware, a car thief can hack and then steal a Tesla car, security researchers have revealed this week.

Previous attempts to hack Tesla cars attacked the vehicle's on-board software itself. This is how Chinese security researchers from Keen Lab have managed to hack a Tesla Model S last month, allowing an attacker to control a car from 12 miles away.

Security experts from Norwegian security firm Promon have taken a different approach, and instead of trying complicated attacks on the car's firmware, they have chosen to go after Tesla's Android app that many car owners use to interact with their vehicle.

Tesla Android app is the hackers' entry point

By default, when Tesla owners install the Android app, they'll have to enter a username and password, for which the app generates an OAuth token. The app will use this token every time the user re-opens his app, so the user won't have to enter a username and password tens of times per day.

The app doesn't keep this token forever, but deletes it after 90 days, and asks the user for his username and password again.

Promon researchers have discovered that the Tesla app keeps this token in a plaintext file, in the app's "sandbox" folder. An attacker can read this token if he has access to the user's phone.

Android app saves OAuth token in cleartext

Researchers say that it's easy for an attacker to create a malicious Android app, that contains rooting exploits such as Towelroot and Kingroot. These exploits can be used to escalate the malicious app's priviliges and read data or alter other apps.

While the token allows an attacker to perform several actions, he can't start a Tesla car. For this he needs the user's password.

Promon researchers say that if the malware deletes the OAuth token from the user's phone, the app will prompt the user to enter his password again, providing the perfect opportunity to collect the user's password.

Attackers also modify the Tesla app's source code to steal login data

Researchers say that this is easy and can be done by modifying the original Tesla app's code. Since the attacker has already rooted the user's phone, the attacker can alter the Tesla app and send a copy of the victim's username and password to the attacker.

With this data in hand, the attacker can perform a series of actions, such as using the car's keyless driving functionality and start the engine, open doors, or track the car on the road. Other actions are also theoretically possible, but researchers haven't tested all of them.

All these are perfomed just by sending well-crafted HTTP requests to the Tesla servers with the victim's OAuth token, and password, when necessary.

Victims must install a malicious app on their phones first

For all of this to be possible, the main key is that the attacker convinces the victim to install a rogue app on his Android device.

In a video below, the Promon team reveals a simple social engineering trick that fools a user to install a malicious app on his phone by promising the victim a free meal at a local restaurant.

While Tesla is to blame for failing to protect the OAuth token in their app, mobile cariers are also at fault. For the past year, Google has been providing timely security updates for the Android OS, which many carriers have been failing to deliver to their customers.

Promon engineers recommend that the Tesla app provide two-factor authentication, should avoid storing the OAuth token in cleartext, prevent easy access to its source code, and use a custom keyboard layout when entering passwords to fight against mobile keyloggers.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: android; malware; tesla

1 posted on 12/01/2016 10:12:18 PM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ThunderSleeps

Ping for your list


2 posted on 12/01/2016 10:12:45 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Video Demonstration on site of a Tesla being stolen after hacker steals user name and password from malicious Android app loaded on to owners phone.


3 posted on 12/01/2016 10:14:12 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I have Zer0 desire to have my vehicles to be in any way networked. CAN makes it too late in many ways.


4 posted on 12/01/2016 10:16:51 PM PST by Paladin2 (No spellcheck. It's too much wwork to undo the auto wrong word substitution on mobile devices.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Tesla.

Not the car of whistleblowers.


5 posted on 12/01/2016 10:21:14 PM PST by Arthur McGowan (https://youtu.be/IYUYya6bPGw)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Neat app. Wholly stupid idea. Doubly so for the Internet of Things. It is amazing, with two decades since the Internet boom, we are still living in the tech Wild Wild West. I am actually amazed more things don’t get p0wned.


6 posted on 12/01/2016 10:33:03 PM PST by John Robinson (I am a twit @_John_Robinson)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Just pull out a key fuse when you park it.


7 posted on 12/01/2016 10:34:05 PM PST by Daniel Ramsey (MAGA)
[ Post Reply | Private Reply | To 1 | View Replies]

To: John Robinson
John, a couple of years ago a hacker named Charlie Miller demonstrated the ability to hack into a Jeep while it was being driven. He could literally control almost everything about that Jeep including turning the windshield wipers on and off, changing the gears, controlling the radio/entertainment system, shutting down the engine, etc. He even had power over the acceleration, braking, and steering to a limited degree. My question is why is any vehicle capable of being connected to the internet have its SYSTEMS on the network while on the road? These capabilities should be hardware locked out from the network when the vehicle is moving. That seems to me to be a no-brainer.

Sometimes an engineer's urge to add more bells and whistles overwhelms the sense God gave an earthworm. . . and they pile on and pile on, regardless of the security of what's being added!

8 posted on 12/01/2016 10:41:21 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Daniel Ramsey

There isn’t a millennial that even knows what a fuse is. Your sir, like me, are old school.

FRegards.


9 posted on 12/01/2016 10:45:44 PM PST by FlyFisher
[ Post Reply | Private Reply | To 7 | View Replies]

To: FlyFisher

I’m 48 and I just feel the old, no school!


10 posted on 12/01/2016 10:52:49 PM PST by dp0622 (IThe only thing an upper crust conservative hates more than a liberal is a middle class conservative)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Swordmaker

Crazy. Security is an after-thought, bolt-on if there’s time. Until security is the foundation of designs, systems will routinely be compromised. With tragic consequences at this pace.


11 posted on 12/02/2016 12:40:03 AM PST by John Robinson (I am a twit @_John_Robinson)
[ Post Reply | Private Reply | To 8 | View Replies]

To: 109ACS; aimhigh; bajabaja; Bikkuri; Bobalu; Bookwoman; Bullish; Carpe Cerevisi; DarthDilbert; ...
Another app vulnerability, though definitely a niche market... - ANDROID PING!

Android Ping!
If you want on or off the Android Ping List, Freepmail me.

My take on it: the phrase "Victims must install a malicious app on their phones first..." is key here. It is becoming obvious that with any of the major smart phone systems - Android, Apple, Windows - the primary vulnerability is from the user installing malicious apps. We are our own worst enemies.
12 posted on 12/02/2016 5:32:32 AM PST by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: FlyFisher

I used to take a fuel pump relay out on my then new years ago Silverado, i had a known burnt out one, i had a mark on the bad one, swapped them out. Thats fine unless you had another old school car thief that knew tricks like that.

When i was much younger and i had a 56 chevy hotrod i wired the coil wire throught a cigarette lighter i modified, you had to push in the lighter to make it run, and yes it stayed in because i soldered the heat coil, pull it out a bit like a normal looking lighter and no juice to coil.

Course now you get burnt at the stake for even asking if a new car or truck has a real working cigarette lighter and not an aux power port.


13 posted on 12/02/2016 6:46:28 AM PST by Daniel Ramsey (MAGA)
[ Post Reply | Private Reply | To 9 | View Replies]

To: ThunderSleeps
Old versions of Android aside (not a whole heck of a lot of Obamaphone Tesla owners out there..), it is rather interesting how little thought is put into basic security, especially by those who supposedly are delivering cutting edge technology to consumers.
14 posted on 12/02/2016 10:32:55 AM PST by kingu (Everything starts with slashing the size and scope of the federal government.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Swordmaker

There’s no link for that when I load the page.


15 posted on 12/02/2016 1:43:53 PM PST by wastedyears (Clinton's supporters crying is the best thing ever..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wastedyears
Try this:

BleepingComputer.com

16 posted on 12/02/2016 2:02:14 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 15 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson