Thursday, February 27, 2025
HomeCyber Security NewsTesla Sues Former Employee for Stealing Sensitive Data

Tesla Sues Former Employee for Stealing Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

Tesla, Inc., an American electric car manufacturing company based in Palo Alto, California has sued a former employee and software engineer named ‘Alex Khatilov’ alleging trade secret theft and breach of contract in his first week of working at the company.

Theft Of Confidential Files

The company accuses Khatilov of stealing code and files from WARP Drive, a back-end software system that Tesla developed to automate a range of business processes involved in manufacturing and selling its cars.

“They also accuse him of deleting possible evidence when security teams confronted him”, reads CNBC report.

The accused was hired to help Tesla’s Quality Assurance team create software that could automate tasks or business processes related to Environment, Health and Safety.

He started working for Tesla on December 28, 2020 and almost immediately began uploading files and scripts (written in a programming language called Python) to his Dropbox account. Tesla confronted him about his alleged theft on January 6th.

The code is of concern to Tesla because it could reveal to competitors “which systems Tesla believes are important and valuable to automate and how to automate them – providing a roadmap to copy Tesla’s innovation,” the complaint says.

Tesla’s security team detected the file downloads on January 6, after Khatilov was hired on December 28, and confronted him via video call as he was working from home, according to the court filing.

Tesla said during this call, Khatilov delayed sharing his screen with the team, during that period “he could be seen on video chat hurriedly deleting information from his computer.”

Earlier Tesla has sued ex-employees of trade theft. The company sued Guangzhi Cao for copying Autopilot source code to his personal accounts and devices in late 2018. That case is still in progress.

In the new complaint on Friday Tesla revealed that only 40 people of around 50,000 total employees work on the company’s Quality Assurance team that hired Khatilov.

The company also says it has spent an estimated “200 man-years of work” to develop the code in question.

Finally, Khatilov told the New York Post on Friday, that the software files ended up in his Dropbox by mistake. He was trying to make a backup copy of a folder on his computer, he told the newspaper, and unintentionally moved it to Dropbox. He was not aware Tesla was suing him until the newspaper reached out to him about the matter.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Facebook Taken Down Number of Political ads due to Technical Flaws in their System

Cisco Fixes High-severity Flaws in Webex, IP Cameras and ISE

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...