Breaking

Tesla data breach of old car parts is for sale on eBay

Security researchers have identified old Tesla car parts for sale on eBay with personal data of previous owners and has created some controversy among the Tesla’s customer privacy. GreenTheOnly, a white hat hacker had mentioned that the media control units (MCUs) and an autopilot hardware that were switched in the old models of Tesla vehicles are now being sold online.

These parts contained previous owners personal data like address, WiFI usernames and passwords, calendar data, call logs, and mobile contact book data that had been paired with the car, along with Netflix and other session cookies that have been accessed earlier through those components.

Tesla data breach through old components

Tesla upgrades car components when requested and the old components are taken back by Tesla and is not allowed to remain with the car owners.

On the contradictory, this discovery by the white hat shows that the techs are selling the withdrawn old components online, or according to InsideEVs, black hats are leveraging a random Tesla warehouse or service centers for the details. 

Tesla has not responded yet to the discovery, and has not denied the same until this article was published. However, the techs have been advised by the firm to crush the old components before disposing of them as a junk. Meanwhile, Tesla is yet to notify its customers about this data breach, however it is better for the previous owners to update passwords of any accounts that have been paired or linked to the car.

Aftermath of Tesla data breach

However, considering the California Consumer Privacy Act (CCPA) is in force, and after Tesla data breach, the company may be asked to prove their innocence or penalized for their negligence of personal data protection and security. Furthermore, with the development in the automotive sector, more components and devices do have access to computerized data.

Any information that is stored in a computerized format, can be equally stored in devices that are involved with the operation. Advanced car manufacturing companies like Tesla and others need to ensure they have proper data protection lifecycle in place to ensure no stone is left unturned. Also, this Tesla data breach case is a wonderful example of non-intentional insider threat vector.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

View Comments

  • Hey guys, I just wanted to see if you need anything in the way of site editing/code fixing/programming, unique blog post material, extra traffic by getting others to start sharing your site across their own social media accounts, social media management, optimizing the site, monitizing the site, etc. I have quite a few ways I can set all of this and do this for you. Don't mean to impose, was just curious, I've been doing this for some time and was just curious if you needed an extra hand. I can even do Wordpress and other related tasks (you name it).

    Stay Safe,

    Winston
    1.708.320.3171

  • If you want to use the photo it would also be good to check with the artist beforehand in case it is subject to copyright. Best wishes. Aaren Reggis Sela

  • Hello. This article was really remarkable, particularly since I was looking for thoughts on this topic last Thursday. Dawna Wyatt Primalia

  • Way cool! Some very valid points! I appreciate you penning this article and also the rest of the site is extremely good. Sarine Jase Essam

  • Way cool! Some very valid points! I appreciate you penning this write-up plus the rest of the site is extremely good. Blisse Leeland Derian

  • Hey just wanted to give you a quick heads up. The words in your content seem to be running off the screen in Ie. Carita Miguel Fried

  • If you want to use the photo it would also be good to check with the artist beforehand in case it is subject to copyright. Best wishes. Aaren Reggis Sela

  • Hi there, after reading this awesome post i am also cheerful to share my familiarity here with mates. Ada Rudy Jefferson

  • Really appreciate you sharing this blog post. Really looking forward to read more. Really Great. Andrea Etan Giess

  • No matter if some one searches for his required thing, thus he/she desires to be available that in detail, so that thing is maintained over here. Britney Callean Macegan

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago