{"id":4274,"date":"2023-11-29T03:51:00","date_gmt":"2023-11-29T03:51:00","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=4274"},"modified":"2023-11-29T11:28:28","modified_gmt":"2023-11-29T11:28:28","slug":"hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/","title":{"rendered":"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<h3>Tesla Hacked at Pwn2Own: A Vulnerability Uncovered<\/h3>\n<p><strong>Tesla Hacked &#8211; PWN2OWN &#8211;<\/strong> On May 2023, Tesla recently encountered a significant cyber security challenge during the <a href=\"https:\/\/www.google.com\/search?q=the+Pwn2Own+hacking+competition+by+offering+large+prizes\">Pwn2Own conference<\/a>, a platform where hackers showcase their prowess by exploiting vulnerabilities in various systems. Despite Tesla&#8217;s ongoing commitment to cybersecurity, the electric vehicle giant was successfully hacked, with the perpetrators walking away with both a hefty $100,000 prize and a compromised Model 3.<\/p>\n<p>Tesla Hack &#8211; For years, Tesla has actively engaged with <a href=\"https:\/\/secry.me\/explore\/tips-and-tricks\/bug-bounty-an-introduction-to-earning-money-as-an-ethical-hacker\/\"><em>whitehat hackers<\/em><\/a>, investing heavily in cybersecurity measures to fortify its systems. The Pwn2Own hacking competition has become a stage for testing the resilience of vehicles, especially Tesla&#8217;s, and this year was no different. The Zero Day Initiative, the organization behind Pwn2Own, confirmed the successful breach, revealing that the hackers managed to compromise the Tesla Model 3 brought to the event.<\/p>\n<p>&nbsp;<\/p>\n<h3>Synacktiv&#8217;s Team Gaining Root Access and Full Car Takeover<\/h3>\n<p>Synacktiv, the hacking team responsible for the exploit, shared details of their accomplishment. They successfully gained root access to Tesla&#8217;s system, achieving a comprehensive &#8220;take over&#8221; of the entire car.<\/p>\n<figure id=\"attachment_4284\" aria-describedby=\"caption-attachment-4284\" style=\"width: 696px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-4284\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Synacktiv-Team-Hack-Tesla-1-1024x743.png\" alt=\"Tesla Model 3 test rig by Synacktiv Team\" width=\"696\" height=\"505\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Synacktiv-Team-Hack-Tesla-1-1024x743.png 1024w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Synacktiv-Team-Hack-Tesla-1-300x218.png 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Synacktiv-Team-Hack-Tesla-1-768x557.png 768w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Synacktiv-Team-Hack-Tesla-1-1536x1114.png 1536w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Synacktiv-Team-Hack-Tesla-1-150x109.png 150w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Synacktiv-Team-Hack-Tesla-1-696x505.png 696w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Synacktiv-Team-Hack-Tesla-1-1068x774.png 1068w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Synacktiv-Team-Hack-Tesla-1.png 1892w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><figcaption id=\"caption-attachment-4284\" class=\"wp-caption-text\">Tesla Model 3 test rig by Synacktiv Team<\/figcaption><\/figure>\n<p>Operating from a hotel room, the team utilized a <strong>Time-of-Check-to-Time-of-Use (TOCTTOU)<\/strong> exploit, specifically targeting the infotainment system through Bluetooth. This type of exploit involves a file-based race condition, challenging Tesla&#8217;s security protocols.<\/p>\n<p>&nbsp;<\/p>\n<h3>The TOCTTOU Exploit: Unraveling the Security Gap<\/h3>\n<p>The Pwn2Own team highlighted the significance of the TOCTTOU exploit, emphasizing its potential impact on Tesla&#8217;s security. This vulnerability occurs when a resource is checked for a specific value, but that value changes before the resource is utilized, creating a potential security gap. Synacktiv&#8217;s success in this endeavor could have allowed for a full chain takeover of the Tesla Model 3:<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">CONFIRMED! <a href=\"https:\/\/twitter.com\/Synacktiv?ref_src=twsrc%5Etfw\">@Synacktiv<\/a> successfully executed a TOCTOU exploit against Tesla \u2013 Gateway. They earn $100,000 as well as 10 Master of Pwn points and this Tesla Model 3. <a href=\"https:\/\/twitter.com\/hashtag\/Pwn2Own?src=hash&amp;ref_src=twsrc%5Etfw\">#Pwn2Own<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/P2OVancouver?src=hash&amp;ref_src=twsrc%5Etfw\">#P2OVancouver<\/a> <a href=\"https:\/\/t.co\/W61NasJPAl\">pic.twitter.com\/W61NasJPAl<\/a><\/p>\n<p>&mdash; Zero Day Initiative (@thezdi) <a href=\"https:\/\/twitter.com\/thezdi\/status\/1638651073274732545?ref_src=twsrc%5Etfw\">March 22, 2023<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Tesla&#8217;s Response and the Path Forward: Strengthening Security Measures<\/h3>\n<p>Tesla, known for its proactive approach to cyber security, is expected to receive detailed insights from the whitehat hackers involved. These findings aim to assist the company in further enhancing the security of its products. This Tesla Hack incident underscores the ongoing challenges and evolving threats in the realm of automotive cybersecurity, prompting continuous vigilance and adaptation within the industry.<\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Tesla Hacked at Pwn2Own: A Vulnerability Uncovered Tesla Hacked &#8211; PWN2OWN &#8211; On May 2023, Tesla recently encountered a significant cyber security challenge during the Pwn2Own conference, a platform where hackers showcase their prowess by exploiting vulnerabilities in various systems. Despite Tesla&#8217;s ongoing commitment to cybersecurity, the electric vehicle giant was successfully hacked, with the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,131],"tags":[397,13,396,192,393,325,335,394,395,392],"class_list":{"0":"post-4274","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-news","9":"tag-automotive-hack","10":"tag-bug-bounty","11":"tag-car-hacking","12":"tag-cyber-security","13":"tag-ellon","14":"tag-exploit","15":"tag-hacker","16":"tag-pwn2own","17":"tag-synacktiv","18":"tag-tesla"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers | SECRY<\/title>\n<meta name=\"description\" content=\"Tesla Hacked at Pwn2Own: A Vulnerability Uncovered Tesla Hacked - PWN2OWN - On May 2023, Tesla recently encountered a significant cyber security challenge\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers | SECRY\" \/>\n<meta property=\"og:description\" content=\"Tesla Hacked at Pwn2Own: A Vulnerability Uncovered Tesla Hacked - PWN2OWN - On May 2023, Tesla recently encountered a significant cyber security challenge\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-29T03:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-29T11:28:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Tesla-Hacked-at-PWN20WN-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/a0dca9413073b143bfc0db687dd0b0d6\"},\"headline\":\"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers\",\"datePublished\":\"2023-11-29T03:51:00+00:00\",\"dateModified\":\"2023-11-29T11:28:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/\"},\"wordCount\":380,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Tesla-Hacked-at-PWN20WN-2.png\",\"keywords\":[\"Automotive Hack\",\"Bug Bounty\",\"Car Hacking\",\"Cyber Security\",\"Ellon\",\"Exploit\",\"Hacker\",\"Pwn2Own\",\"Synacktiv\",\"Tesla\"],\"articleSection\":[\"Cyber Security\",\"Hacker News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/\",\"name\":\"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Tesla-Hacked-at-PWN20WN-2.png\",\"datePublished\":\"2023-11-29T03:51:00+00:00\",\"dateModified\":\"2023-11-29T11:28:28+00:00\",\"description\":\"Tesla Hacked at Pwn2Own: A Vulnerability Uncovered Tesla Hacked - PWN2OWN - On May 2023, Tesla recently encountered a significant cyber security challenge\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Tesla-Hacked-at-PWN20WN-2.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Tesla-Hacked-at-PWN20WN-2.png\",\"width\":1280,\"height\":720,\"caption\":\"Tesla Hacked at PWN20WN\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/a0dca9413073b143bfc0db687dd0b0d6\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers | SECRY","description":"Tesla Hacked at Pwn2Own: A Vulnerability Uncovered Tesla Hacked - PWN2OWN - On May 2023, Tesla recently encountered a significant cyber security challenge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers | SECRY","og_description":"Tesla Hacked at Pwn2Own: A Vulnerability Uncovered Tesla Hacked - PWN2OWN - On May 2023, Tesla recently encountered a significant cyber security challenge","og_url":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-11-29T03:51:00+00:00","article_modified_time":"2023-11-29T11:28:28+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Tesla-Hacked-at-PWN20WN-2.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/a0dca9413073b143bfc0db687dd0b0d6"},"headline":"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers","datePublished":"2023-11-29T03:51:00+00:00","dateModified":"2023-11-29T11:28:28+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/"},"wordCount":380,"commentCount":1,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Tesla-Hacked-at-PWN20WN-2.png","keywords":["Automotive Hack","Bug Bounty","Car Hacking","Cyber Security","Ellon","Exploit","Hacker","Pwn2Own","Synacktiv","Tesla"],"articleSection":["Cyber Security","Hacker News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/","url":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/","name":"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Tesla-Hacked-at-PWN20WN-2.png","datePublished":"2023-11-29T03:51:00+00:00","dateModified":"2023-11-29T11:28:28+00:00","description":"Tesla Hacked at Pwn2Own: A Vulnerability Uncovered Tesla Hacked - PWN2OWN - On May 2023, Tesla recently encountered a significant cyber security challenge","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Tesla-Hacked-at-PWN20WN-2.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Tesla-Hacked-at-PWN20WN-2.png","width":1280,"height":720,"caption":"Tesla Hacked at PWN20WN"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/hacked-at-pwn2own-tesla-loses-1-million-and-model-3-to-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Hacked at Pwn2Own, Tesla Loses $1 million and Model 3 to Hackers"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/a0dca9413073b143bfc0db687dd0b0d6","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=4274"}],"version-history":[{"count":16,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4274\/revisions"}],"predecessor-version":[{"id":4280,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4274\/revisions\/4280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/4295"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=4274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=4274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=4274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}