By using this site, you agree to the Privacy Policy and Terms of Use.
Accept

GadgetBond

  • Latest
  • How-to
  • Tech
    • AI
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Add GadgetBond as a preferred source to see more of our stories on Google.
Font ResizerAa
GadgetBondGadgetBond
  • Latest
  • Tech
  • AI
  • Deals
  • How-to
  • Apps
  • Mobile
  • Gaming
  • Streaming
  • Transportation
Search
  • Latest
  • Deals
  • How-to
  • Tech
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • AI
    • Anthropic
    • ChatGPT
    • ChatGPT Atlas
    • Gemini AI (formerly Bard)
    • Google DeepMind
    • Grok AI
    • Meta AI
    • Microsoft Copilot
    • OpenAI
    • Perplexity
    • xAI
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Follow US
TechTeslaTransportation

Tesla’s two-factor authentication easily bypassed by Wi-Fi hijacking hack

$169 device allows hackers to steal Teslas by hijacking charging station Wi-Fi

By
Shubham Sawarkar
Shubham Sawarkar's avatar
ByShubham Sawarkar
Editor-in-Chief
I’m a tech enthusiast who loves exploring gadgets, trends, and innovations. With certifications in CISCO Routing & Switching and Windows Server Administration, I bring a sharp...
Follow:
- Editor-in-Chief
Mar 12, 2024, 1:39 AM EDT
Share
We may get a commission from retail offers. Learn more
Tesla's two-factor authentication easily bypassed by Wi-Fi hijacking hack
Photo by PATRICK T. FALLON/AFP via Getty Images
SHARE

Security researchers have uncovered a critical vulnerability that could allow hackers to steal Tesla vehicles by hijacking Wi-Fi networks at the company’s charging stations. This glaring cybersecurity flaw, which requires only an inexpensive, off-the-shelf tool, exposes a significant risk for Tesla owners and raises concerns about the automaker’s security measures.

The vulnerability was discovered by Tommy Mysk and Talal Haj Bakry, security researchers at Mysk Inc., who demonstrated their findings in a recent YouTube video. According to Gizmodo, which first reported on the video, the researchers showed how hackers could use a simple $169 hacking tool called Flipper Zero, a Raspberry Pi, or even a laptop to exploit this vulnerability.

“This means with a leaked email and password, an owner could lose their Tesla vehicle,” Mysk told Gizmodo, highlighting the severity of the issue. “Phishing and social engineering attacks are very common today, especially with the rise of AI technologies, and responsible companies must factor in such risks in their threat models.”

The researchers’ approach is alarmingly straightforward. Using their chosen device, hackers can create a spoofed Wi-Fi network called “Tesla Guest,” mimicking the network that Tesla typically provides free of charge to customers waiting at charging stations.

If an unsuspecting victim attempts to connect to this fake network, they may be tricked into entering their login credentials on a duplicate site, inadvertently handing over their information to the hackers.

Once the hackers have acquired these stolen login details, they can bypass Tesla’s two-factor authentication and gain access to the victim’s Tesla smartphone app, effectively unlocking the vehicle without ever needing a physical key card.

The implications of this vulnerability are far-reaching. Not only can hackers unlock the vehicle, but they can also create a new “phone key,” enabling them to return to the car at a later time and drive away with it without arousing suspicion.

Disturbingly, Tesla does not currently notify users when a new phone key is created, a fact that Mysk and Bakry highlight in their video.

To validate their findings, Mysk tested the vulnerability on his own Tesla and found that he could easily create new phone keys without ever having access to the original physical key card. This directly contradicts Tesla’s claim in its owner’s manual that such an action is impossible.

When Mysk informed Tesla about his findings, the company downplayed the vulnerability, stating that it was an “intended behavior” – a response that Mysk called “preposterous” in his interview with Gizmodo.

“The design to pair a phone key is clearly made super easy at the expense of security,” he said, criticizing Tesla’s approach.

Mysk argues that Tesla could easily address this vulnerability by simply notifying users whenever a new phone key is created, allowing them to take immediate action if they suspect unauthorized access.

However, whether the automaker will heed this call remains to be seen, leaving Tesla owners potentially exposed to a significant security risk until a fix is implemented.


Discover more from GadgetBond

Subscribe to get the latest posts sent to your email.

Most Popular

ExpressVPN is the first to plug VPN infrastructure into Anthropic’s MCP ecosystem

ExpressVPN MCP server: what it is, how it works, and who it’s for

How to enable the ExpressVPN MCP server on your AI tools

This Nimble 35W GaN charger with retractable cable is $16 off

25W Qi2 wireless comes alive with this Google Pixelsnap Charger deal

Also Read
Screenshot of the Perplexity Computer interface showing a user prompt at the top asking the agent to contribute to the Openclaw project by fixing bugs using Claude Code and then opening a pull request on a linked GitHub issue, with the assistant’s response below saying it will load relevant skills, fetch the GitHub issue details, and displaying a “Running tasks in parallel” status list for loading the coding‑and‑data skill and fetching the issue details, all on a light themed UI.

Claude Code and GitHub CLI now live inside Perplexity Computer

A person stands in front of a blue tiled wall featuring the illuminated word “OpenAI.” They are holding a smartphone and appear to be engaged with it, possibly taking a photo or interacting with content. The scene emphasizes the OpenAI brand in a modern, tech-savvy setting.

The Pentagon AI deal that OpenAI’s robotics head couldn’t accept

Nimble Fold 3-in-1 Wireless Travel Charging Dock

Charge iPhone, Apple Watch and AirPods with this Nimble 3‑in‑1 deal

A simple illustration shows a large black computer mouse cursor pointing toward a white central hub with five connected nodes on an orange background.

Claude Marketplace lets you use one AI commitment across multiple tools

Perplexity Computer promotional banner featuring a glowing glass orb with a laptop icon floating above a field of wildflowers against a gray background, with the text "perplexity computer works" in the center and a vertical list of action words — sends, creates, schedules, researches, orchestrates, remembers, deploys, connects — displayed in fading gray text on the right side.

Perplexity Computer is the AI that actually does your work

99ONE Rogue 102321

99ONE Rogue wants to kill the ugly helmet comms box forever

TACT Dial 01 tactile desk instrument

TACT Dial 01: turn it, press it, focus — that’s literally it

Close-up of a person holding the Google Pixel 10 Pro Fold in Moonstone gray with both hands, rear-facing triple camera array and Google "G" logo prominently visible, worn against a silver knit top and blue jacket with a poolside background.

Pixel Care+ makes owning a Pixel a lot less scary — here’s why

Company Info
  • Homepage
  • Support my work
  • Latest stories
  • Company updates
  • GDB Recommends
  • Daily newsletters
  • About us
  • Contact us
  • Write for us
  • Editorial guidelines
Legal
  • Privacy Policy
  • Cookies Policy
  • Terms & Conditions
  • DMCA
  • Disclaimer
  • Accessibility Policy
  • Security Policy
  • Do Not Sell or Share My Personal Information
Socials
Follow US

Disclosure: We love the products we feature and hope you’ll love them too. If you purchase through a link on our site, we may receive compensation at no additional cost to you. Read our ethics statement. Please note that pricing and availability are subject to change.

Copyright © 2026 GadgetBond. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | Do Not Sell/Share My Personal Information.