Thursday, March 28, 2024

Ex-Tesla Employee Sued for Uploading an Autopilot Source Code to his iCloud and Shipped to China

Former Tesla Employee Guangzhi Cao sued for illegally uploading the Tesla Autopilot source code into his personal iCloud Account in 2018 when he was one of the members of Tesla’s Autopilot team.

Tesla brings a suit against Cao for allegedly Stole Tesla’s source code and other company information as “trade secrets” and take those data to Xiaopeng Motors, Chinese based intelligent electric vehicle startup.

Xiaopeng Motors already faced a lawsuit for stealing the trade secrets which is related to another case that held in last year, a former Apple employee was arrested for stealing the files related to Cupertino’s self-driving car and bringing to China where he intended to move for work with Xiaopeng Motors.

In November 2018, Cao was offered a role by Xiaopeng Motors, before that Cao uploading the copies of 300,000 files and directories of Tesla’s Autopilot-related source code which is completely against Tesla’s policies and employment agreements.

Court Statement quoted that Cao created zip files of Tesla’s Autopilot-related source code and he allegedly deleted 120,000 files and disconnected his personal iCloud account from his Tesla-issued computer around December 26.

In the court filing, Cao denied the allegation and defend that he wasn’t involved in the theft of trade secrets but Tesla disagrees and states that he was employed in  “crown jewel of Tesla’s intellectual property portfolio” and that Cao tried to bring these trade secrets to Xiaopeng Motors, his new employer.

Uploaded Telsa Autopilot source code may reveal how Tesla has approached and solved problems in vehicle autonomy and how they used camera and radar to solve problems in autonomous driving.

According to the count fillings, “Cao admits that Tesla’s network and servers are passwords- and firewall-protected and are accessible only to current Tesla employees with proper credentials. Mr. Cao denies the allegations in this paragraph relating to Tesla’s protocols after employees resign or are terminated”

Tesla Also complaints that he access the source code that stored in Tesla’s own server which is protected behind Tesla’s strong firewall.

Mr. Cao also admits that he had access to some information that Tesla considers confidential while he was working at Tesla.

In this case, Cao’s lawyers argue that any source code or other confidential information that remained on his devices after he left Tesla would only be there “as a result of inadvertence.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Read More

Tesla Car Has Been Hacked and Stolen By Intercepting the Signal From Key Fob

Pwn2Own 2019 – Tesla Car Internet Browser Hacked – Hackers Won the Car & $545,000 in Total – Day 3

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles