Tesla Man-in-the-Middle Phishing Attack: A Threat to Tesla Cars Here is a quick look.


Tesla Man-in-the-Middle Phishing Attack: A Threat to Tesla Cars Here is a quick look.

Tesla – A recent revelation in the cybersecurity world has raised concerns among Tesla car owners. Security researchers have demonstrated a Man-in-the-Middle (MiTM) phishing attack that can compromise Tesla accounts, leading to unauthorized unlocking and potential theft of Tesla cars.

How Does the Attack Work?

The attack exploits vulnerabilities in the latest Tesla app, version 4.30.6, and Tesla software version 11.1 2024.2.7. The researchers, Talal Haj Bakry and Tommy Mysk, demonstrated how they could register a new ‘Phone key’ that could be used to access the Tesla.

The attack begins with the attacker deploying a Wi-Fi network called “Tesla Guest,” an SSID that is commonly found at Tesla service centers and familiar to car owners. Once the victim connects to the spoofed network, they are served a fake Tesla login page asking to log in using their Tesla account credentials. Whatever the victim enters on the phishing page, the attacker can see in real time.

After entering the Tesla account credentials, the phishing page requests the one-time password for the account, to help the attacker bypass the two-factor authentication protection. The attacker has to move before the OTP expires and log into the Tesla app using the stolen credentials. Once in the account, the threat actor can track the vehicle’s location in real time.

Official Statements

The researchers reported their findings to Tesla, stating that linking a car to a new phone lack proper authentication security. However, Tesla determined the report to be out of scope.

Understanding MiTM Attacks

A Man-in-the-Middle (MiTM) attack is a type of cyberattack where a malicious actor inserts themselves between two parties, often to steal login credentials or personal information, spy on victims, sabotage communications, or corrupt data. In the case of the Tesla attack, the MiTM attack was used to intercept the communication between the Tesla app and the Tesla servers, allowing the attackers to gain unauthorized access to the vehicle.

Prevention Measures for MiTM Attacks

To protect against such attacks, users are advised to follow certain measures:

  1. Keep your operating systems and devices up to date.
  2. Use a VPN to add an extra layer of security to your local network or when accessing public Wi-Fi networks.
  3. Avoid connecting to unsecured public Wi-Fis when carrying out transactions, online banking, shopping, or other activities that use sensitive information.
  4. Don’t access unsecured websites while browsing.
  5. Pay attention to phishing emails.


While the demonstrated attack is concerning, it also serves as a reminder of the importance of cybersecurity in our increasingly connected world. Users must remain vigilant and take necessary precautions to protect their digital assets. As for Tesla, this incident may prompt a review of their security protocols to ensure the safety and security of their customers.

You think you have a story worth everyone’s time? SUBMIT A STORY and we will publish it.

Share this content:

Post Comment