By using this site, you agree to the Privacy Policy and Terms of Use.
Accept

GadgetBond

  • Latest
  • How-to
  • Tech
    • AI
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Add GadgetBond as a preferred source to see more of our stories on Google.
Font ResizerAa
GadgetBondGadgetBond
  • Latest
  • Tech
  • AI
  • Deals
  • How-to
  • Apps
  • Mobile
  • Gaming
  • Streaming
  • Transportation
Search
  • Latest
  • Deals
  • How-to
  • Tech
    • Amazon
    • Apple
    • CES
    • Computing
    • Creators
    • Google
    • Meta
    • Microsoft
    • Mobile
    • Samsung
    • Security
    • Xbox
  • AI
    • Anthropic
    • ChatGPT
    • ChatGPT Atlas
    • Gemini AI (formerly Bard)
    • Google DeepMind
    • Grok AI
    • Meta AI
    • Microsoft Copilot
    • OpenAI
    • Perplexity
    • xAI
  • Transportation
    • Audi
    • BMW
    • Cadillac
    • E-Bike
    • Ferrari
    • Ford
    • Honda Prelude
    • Lamborghini
    • McLaren W1
    • Mercedes
    • Porsche
    • Rivian
    • Tesla
  • Culture
    • Apple TV
    • Disney
    • Gaming
    • Hulu
    • Marvel
    • HBO Max
    • Netflix
    • Paramount
    • SHOWTIME
    • Star Wars
    • Streaming
Follow US
TechTeslaTransportation

Tesla’s two-factor authentication easily bypassed by Wi-Fi hijacking hack

$169 device allows hackers to steal Teslas by hijacking charging station Wi-Fi

By
Shubham Sawarkar
Shubham Sawarkar's avatar
ByShubham Sawarkar
Editor-in-Chief
I’m a tech enthusiast who loves exploring gadgets, trends, and innovations. With certifications in CISCO Routing & Switching and Windows Server Administration, I bring a sharp...
Follow:
- Editor-in-Chief
Mar 12, 2024, 1:39 AM EDT
Share
We may get a commission from retail offers. Learn more
Tesla's two-factor authentication easily bypassed by Wi-Fi hijacking hack
Photo by PATRICK T. FALLON/AFP via Getty Images
SHARE

Security researchers have uncovered a critical vulnerability that could allow hackers to steal Tesla vehicles by hijacking Wi-Fi networks at the company’s charging stations. This glaring cybersecurity flaw, which requires only an inexpensive, off-the-shelf tool, exposes a significant risk for Tesla owners and raises concerns about the automaker’s security measures.

The vulnerability was discovered by Tommy Mysk and Talal Haj Bakry, security researchers at Mysk Inc., who demonstrated their findings in a recent YouTube video. According to Gizmodo, which first reported on the video, the researchers showed how hackers could use a simple $169 hacking tool called Flipper Zero, a Raspberry Pi, or even a laptop to exploit this vulnerability.

“This means with a leaked email and password, an owner could lose their Tesla vehicle,” Mysk told Gizmodo, highlighting the severity of the issue. “Phishing and social engineering attacks are very common today, especially with the rise of AI technologies, and responsible companies must factor in such risks in their threat models.”

The researchers’ approach is alarmingly straightforward. Using their chosen device, hackers can create a spoofed Wi-Fi network called “Tesla Guest,” mimicking the network that Tesla typically provides free of charge to customers waiting at charging stations.

If an unsuspecting victim attempts to connect to this fake network, they may be tricked into entering their login credentials on a duplicate site, inadvertently handing over their information to the hackers.

Once the hackers have acquired these stolen login details, they can bypass Tesla’s two-factor authentication and gain access to the victim’s Tesla smartphone app, effectively unlocking the vehicle without ever needing a physical key card.

The implications of this vulnerability are far-reaching. Not only can hackers unlock the vehicle, but they can also create a new “phone key,” enabling them to return to the car at a later time and drive away with it without arousing suspicion.

Disturbingly, Tesla does not currently notify users when a new phone key is created, a fact that Mysk and Bakry highlight in their video.

To validate their findings, Mysk tested the vulnerability on his own Tesla and found that he could easily create new phone keys without ever having access to the original physical key card. This directly contradicts Tesla’s claim in its owner’s manual that such an action is impossible.

When Mysk informed Tesla about his findings, the company downplayed the vulnerability, stating that it was an “intended behavior” – a response that Mysk called “preposterous” in his interview with Gizmodo.

“The design to pair a phone key is clearly made super easy at the expense of security,” he said, criticizing Tesla’s approach.

Mysk argues that Tesla could easily address this vulnerability by simply notifying users whenever a new phone key is created, allowing them to take immediate action if they suspect unauthorized access.

However, whether the automaker will heed this call remains to be seen, leaving Tesla owners potentially exposed to a significant security risk until a fix is implemented.


Discover more from GadgetBond

Subscribe to get the latest posts sent to your email.

Most Popular

Microsoft Agent 365 launches with multi-cloud governance and shadow AI tools

Code with Claude 2026 is back – bigger, bolder, and international

OneNote Copilot now understands images, tables, and note tags

Microsoft overhauls Win+R with a faster, cleaner, Fluent Design Run dialog

Anthropic opens Claude Security to all enterprise customers in public beta

Also Read
Side-by-side comparison of two Instagram posts showing the same DJ image; the left labeled “Original” includes a caption by the creator, while the right labeled “Unoriginal” shows a repost with minimal caption, highlighting attribution differences.

Instagram now punishes accounts that repost other people’s content

Illustration of Microsoft Word interface showing a stylized document with formatting icons, user collaboration profile pictures, and a cloud background, representing Word’s cloud-based saving and collaboration features.

Legal Agent in Microsoft Word is now live for Frontier users in the US

Promotional graphic from Canva titled “The Devil Wears Prada 2,” featuring themed design templates including a bingo card, a “What’s in her bag?” layout, and a stylized quote card on a red background with a city skyline silhouette.

The Devil Wears Prada 2 templates hit Canva – and they’re seriously chic

Abigail Besdin

Mozilla names Abigail Besdin as its new Chief Operating Officer

Promotional image for Xbox Mode on Windows 11 devices, showing a desktop PC, laptops, handheld gaming devices, and an Xbox controller, all displaying a unified Xbox gaming interface with featured games on screen.

Xbox Mode is now rolling out to Windows 11 PCs

A Dell laptop with the Windows logo displayed on its screen is shown on a colorful background with pink on top and blue on the bottom, viewed at an angle with part of the keyboard visible.

You can now download ISOs for Windows Insider Preview Builds every time

Google Photos logo displayed on a light green background, featuring the black pinwheel-style Google Photos icon to the left and the text “Google Photos” in clean, bold lettering to the right.

Education users can now transfer Google Photos to personal accounts

A circular Google logo sign featuring the iconic multicolored "G" in red, yellow, green, and blue, displayed against a light gray striped background.

Google Workspace MCP server is now open for developer preview

Company Info
  • Homepage
  • Support my work
  • Latest stories
  • Company updates
  • GDB Recommends
  • Daily newsletters
  • About us
  • Contact us
  • Write for us
  • Editorial guidelines
Legal
  • Privacy Policy
  • Cookies Policy
  • Terms & Conditions
  • DMCA
  • Disclaimer
  • Accessibility Policy
  • Security Policy
  • Do Not Sell or Share My Personal Information
Socials
Follow US

Disclosure: We love the products we feature and hope you’ll love them too. If you purchase through a link on our site, we may receive compensation at no additional cost to you. Read our ethics statement. Please note that pricing and availability are subject to change.

Copyright © 2026 GadgetBond. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | Do Not Sell/Share My Personal Information.