Breaking

Tesla data breach of old car parts is for sale on eBay

Security researchers have identified old Tesla car parts for sale on eBay with personal data of previous owners and has created some controversy among the Tesla’s customer privacy. GreenTheOnly, a white hat hacker had mentioned that the media control units (MCUs) and an autopilot hardware that were switched in the old models of Tesla vehicles are now being sold online.

These parts contained previous owners personal data like address, WiFI usernames and passwords, calendar data, call logs, and mobile contact book data that had been paired with the car, along with Netflix and other session cookies that have been accessed earlier through those components.

Tesla data breach through old components

Tesla upgrades car components when requested and the old components are taken back by Tesla and is not allowed to remain with the car owners.

On the contradictory, this discovery by the white hat shows that the techs are selling the withdrawn old components online, or according to InsideEVs, black hats are leveraging a random Tesla warehouse or service centers for the details. 

Tesla has not responded yet to the discovery, and has not denied the same until this article was published. However, the techs have been advised by the firm to crush the old components before disposing of them as a junk. Meanwhile, Tesla is yet to notify its customers about this data breach, however it is better for the previous owners to update passwords of any accounts that have been paired or linked to the car.

Aftermath of Tesla data breach

However, considering the California Consumer Privacy Act (CCPA) is in force, and after Tesla data breach, the company may be asked to prove their innocence or penalized for their negligence of personal data protection and security. Furthermore, with the development in the automotive sector, more components and devices do have access to computerized data.

Any information that is stored in a computerized format, can be equally stored in devices that are involved with the operation. Advanced car manufacturing companies like Tesla and others need to ensure they have proper data protection lifecycle in place to ensure no stone is left unturned. Also, this Tesla data breach case is a wonderful example of non-intentional insider threat vector.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

View Comments

  • Hey guys, I just wanted to see if you need anything in the way of site editing/code fixing/programming, unique blog post material, extra traffic by getting others to start sharing your site across their own social media accounts, social media management, optimizing the site, monitizing the site, etc. I have quite a few ways I can set all of this and do this for you. Don't mean to impose, was just curious, I've been doing this for some time and was just curious if you needed an extra hand. I can even do Wordpress and other related tasks (you name it).

    Stay Safe,

    Winston
    1.708.320.3171

  • If you want to use the photo it would also be good to check with the artist beforehand in case it is subject to copyright. Best wishes. Aaren Reggis Sela

  • Hello. This article was really remarkable, particularly since I was looking for thoughts on this topic last Thursday. Dawna Wyatt Primalia

  • Way cool! Some very valid points! I appreciate you penning this article and also the rest of the site is extremely good. Sarine Jase Essam

  • Way cool! Some very valid points! I appreciate you penning this write-up plus the rest of the site is extremely good. Blisse Leeland Derian

  • Hey just wanted to give you a quick heads up. The words in your content seem to be running off the screen in Ie. Carita Miguel Fried

  • If you want to use the photo it would also be good to check with the artist beforehand in case it is subject to copyright. Best wishes. Aaren Reggis Sela

  • Hi there, after reading this awesome post i am also cheerful to share my familiarity here with mates. Ada Rudy Jefferson

  • Really appreciate you sharing this blog post. Really looking forward to read more. Really Great. Andrea Etan Giess

  • No matter if some one searches for his required thing, thus he/she desires to be available that in detail, so that thing is maintained over here. Britney Callean Macegan

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

3 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

3 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

3 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

4 months ago