您现在的位置是:娛樂 >>正文
【】
娛樂31人已围观
简介There's digital gold in them thar computers, and hackers are digging their way in.Tesla is hailed as ...
There's digital gold in them thar computers, and hackers are digging their way in.
Tesla is hailed as a cutting-edge company known for setting the agenda in its field, but when it comes to being the victim of malicious hackers hijacking its computer resources to mine cryptocurrency, it turns out it's just like everyone else.
SEE ALSO:YouTube ads are the latest ground zero for nefarious crypto miningAccording to cloud security company RedLock, Tesla has joined the growing list of companies that have been subjected to what experts call cryptojacking — a practice involving the theft of computer processing power to mine cryptocurrencies like bitcoin or Monero.
Hackers reportedly took control of Tesla’s (non-password protected) Kubernetes console — something that helps to administer a Google-designed "managed environment for deploying containerized applications" — and installed and ran crypto-mining software.
The report leaves some big questions unanswered, such as what mining software was used and what cryptocurrency was being mined. In the past, Coinhive has made a lot of news for mining Monero — the preferred cryptocurrency of criminals as it is seen to offer more anonymity than Bitcoin — on unsuspecting victims' computers. Just recently, Salon announced it would mine Monero on some visitors' computers.
Interestingly, whoever was behind the Tesla hack went to great pains to cover their tracks. According to RedLock, "the hackers had most likely configured the mining software to keep the [CPU] usage low to evade detection." Unexplained spiking CPU usage is often seen as a red flag for potential cryptojacking.
What's more, the attackers also "hid the true IP address of the mining pool server behind CloudFlare, a free content delivery network (CDN) service."
Basically, whoever was behind this really didn't want to get caught (surprise), and had some great tricks up their sleeve to evade detection. Perhaps they just really wanted to combine their love of Tesla and hodling bitcoin?
Tweet may have been deleted
RedLock reported its discoveries to Tesla, which quickly worked to rectify the situation. It also paid out a small bug bounty to the company, reports Fortune.
“We maintain a bug bounty program to encourage this type of research,” a company spokesperson explained to the publication.
While the security team at Tesla (with RedLock's help) was eventually able to lock this down, there is one type of cryptocurrency mining no amount of security hygiene will be able to stop — using power from the Supercharger network to run a mining rig.
But oh well, you have to start somewhere.
Featured Video For You
Fisker's luxury electric car might be a Tesla killer
TopicsBitcoinCybersecurityTeslaCryptocurrency
Tags:
转载:欢迎各位朋友分享到网络,但转载请说明文章出处“夫榮妻貴網”。http://new.maomao321.com/news/3e53399463.html
相关文章
You will love/hate Cards Against Humanity's new fortune cookies
娛樂If you've ever ordered Cards Against Humanity from the delightfully corrupt board game's website, yo ...
【娛樂】
阅读更多含鐵量高的食物有哪些
娛樂人體的健康,是離不開一些微量元素的。如果人體微量元素缺乏的話 ,那麽也會相應的出血一些健康方麵的問題 ,比如說缺鐵就是一種常見的健康問題 ,而缺鐵最明顯的影響就是會導致人們出現貧血的症狀。當然 ,想要補鐵,可 ...
【娛樂】
阅读更多女人手腳冰涼吃什麽藥
娛樂女性朋友們老是會覺得自己手腳冰涼,這個時候就會覺得特別的難受 ,而且這多半就是因為血液循環受到阻礙後而導致的一種病情狀況 ,那麽就應該要先去醫院做詳細的檢查,隻有這樣才可以知道真正的病情原因,在確診後就可 ...
【娛樂】
阅读更多