Tuesday, July 16, 2024
EHA

Ex-Tesla Employee Sued for Uploading an Autopilot Source Code to his iCloud and Shipped to China

Former Tesla Employee Guangzhi Cao sued for illegally uploading the Tesla Autopilot source code into his personal iCloud Account in 2018 when he was one of the members of Tesla’s Autopilot team.

Tesla brings a suit against Cao for allegedly Stole Tesla’s source code and other company information as “trade secrets” and take those data to Xiaopeng Motors, Chinese based intelligent electric vehicle startup.

Xiaopeng Motors already faced a lawsuit for stealing the trade secrets which is related to another case that held in last year, a former Apple employee was arrested for stealing the files related to Cupertino’s self-driving car and bringing to China where he intended to move for work with Xiaopeng Motors.

In November 2018, Cao was offered a role by Xiaopeng Motors, before that Cao uploading the copies of 300,000 files and directories of Tesla’s Autopilot-related source code which is completely against Tesla’s policies and employment agreements.

Court Statement quoted that Cao created zip files of Tesla’s Autopilot-related source code and he allegedly deleted 120,000 files and disconnected his personal iCloud account from his Tesla-issued computer around December 26.

In the court filing, Cao denied the allegation and defend that he wasn’t involved in the theft of trade secrets but Tesla disagrees and states that he was employed in  “crown jewel of Tesla’s intellectual property portfolio” and that Cao tried to bring these trade secrets to Xiaopeng Motors, his new employer.

Uploaded Telsa Autopilot source code may reveal how Tesla has approached and solved problems in vehicle autonomy and how they used camera and radar to solve problems in autonomous driving.

According to the count fillings, “Cao admits that Tesla’s network and servers are passwords- and firewall-protected and are accessible only to current Tesla employees with proper credentials. Mr. Cao denies the allegations in this paragraph relating to Tesla’s protocols after employees resign or are terminated”

Tesla Also complaints that he access the source code that stored in Tesla’s own server which is protected behind Tesla’s strong firewall.

Mr. Cao also admits that he had access to some information that Tesla considers confidential while he was working at Tesla.

In this case, Cao’s lawyers argue that any source code or other confidential information that remained on his devices after he left Tesla would only be there “as a result of inadvertence.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Read More

Tesla Car Has Been Hacked and Stolen By Intercepting the Signal From Key Fob

Pwn2Own 2019 – Tesla Car Internet Browser Hacked – Hackers Won the Car & $545,000 in Total – Day 3

Website

Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles