Saturday, December 2, 2023

Ex-Tesla Employee Sued for Uploading an Autopilot Source Code to his iCloud and Shipped to China

Former Tesla Employee Guangzhi Cao sued for illegally uploading the Tesla Autopilot source code into his personal iCloud Account in 2018 when he was one of the members of Tesla’s Autopilot team.

Tesla brings a suit against Cao for allegedly Stole Tesla’s source code and other company information as “trade secrets” and take those data to Xiaopeng Motors, Chinese based intelligent electric vehicle startup.

Xiaopeng Motors already faced a lawsuit for stealing the trade secrets which is related to another case that held in last year, a former Apple employee was arrested for stealing the files related to Cupertino’s self-driving car and bringing to China where he intended to move for work with Xiaopeng Motors.

In November 2018, Cao was offered a role by Xiaopeng Motors, before that Cao uploading the copies of 300,000 files and directories of Tesla’s Autopilot-related source code which is completely against Tesla’s policies and employment agreements.

Court Statement quoted that Cao created zip files of Tesla’s Autopilot-related source code and he allegedly deleted 120,000 files and disconnected his personal iCloud account from his Tesla-issued computer around December 26.

In the court filing, Cao denied the allegation and defend that he wasn’t involved in the theft of trade secrets but Tesla disagrees and states that he was employed in  “crown jewel of Tesla’s intellectual property portfolio” and that Cao tried to bring these trade secrets to Xiaopeng Motors, his new employer.

Uploaded Telsa Autopilot source code may reveal how Tesla has approached and solved problems in vehicle autonomy and how they used camera and radar to solve problems in autonomous driving.

According to the count fillings, “Cao admits that Tesla’s network and servers are passwords- and firewall-protected and are accessible only to current Tesla employees with proper credentials. Mr. Cao denies the allegations in this paragraph relating to Tesla’s protocols after employees resign or are terminated”

Tesla Also complaints that he access the source code that stored in Tesla’s own server which is protected behind Tesla’s strong firewall.

Mr. Cao also admits that he had access to some information that Tesla considers confidential while he was working at Tesla.

In this case, Cao’s lawyers argue that any source code or other confidential information that remained on his devices after he left Tesla would only be there “as a result of inadvertence.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Read More

Tesla Car Has Been Hacked and Stolen By Intercepting the Signal From Key Fob

Pwn2Own 2019 – Tesla Car Internet Browser Hacked – Hackers Won the Car & $545,000 in Total – Day 3

Website

Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles