Monday, November 18, 2024
HomeCyber Security NewsTesla Sues Former Employee for Stealing Sensitive Data

Tesla Sues Former Employee for Stealing Sensitive Data

Published on

Tesla, Inc., an American electric car manufacturing company based in Palo Alto, California has sued a former employee and software engineer named ‘Alex Khatilov’ alleging trade secret theft and breach of contract in his first week of working at the company.

Theft Of Confidential Files

The company accuses Khatilov of stealing code and files from WARP Drive, a back-end software system that Tesla developed to automate a range of business processes involved in manufacturing and selling its cars.

- Advertisement - SIEM as a Service

“They also accuse him of deleting possible evidence when security teams confronted him”, reads CNBC report.

The accused was hired to help Tesla’s Quality Assurance team create software that could automate tasks or business processes related to Environment, Health and Safety.

He started working for Tesla on December 28, 2020 and almost immediately began uploading files and scripts (written in a programming language called Python) to his Dropbox account. Tesla confronted him about his alleged theft on January 6th.

The code is of concern to Tesla because it could reveal to competitors “which systems Tesla believes are important and valuable to automate and how to automate them – providing a roadmap to copy Tesla’s innovation,” the complaint says.

Tesla’s security team detected the file downloads on January 6, after Khatilov was hired on December 28, and confronted him via video call as he was working from home, according to the court filing.

Tesla said during this call, Khatilov delayed sharing his screen with the team, during that period “he could be seen on video chat hurriedly deleting information from his computer.”

Earlier Tesla has sued ex-employees of trade theft. The company sued Guangzhi Cao for copying Autopilot source code to his personal accounts and devices in late 2018. That case is still in progress.

In the new complaint on Friday Tesla revealed that only 40 people of around 50,000 total employees work on the company’s Quality Assurance team that hired Khatilov.

The company also says it has spent an estimated “200 man-years of work” to develop the code in question.

Finally, Khatilov told the New York Post on Friday, that the software files ended up in his Dropbox by mistake. He was trying to make a backup copy of a folder on his computer, he told the newspaper, and unintentionally moved it to Dropbox. He was not aware Tesla was suing him until the newspaper reached out to him about the matter.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Facebook Taken Down Number of Political ads due to Technical Flaws in their System

Cisco Fixes High-severity Flaws in Webex, IP Cameras and ISE

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild

A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution,...

Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability

Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing...

GeoVision 0-Day Vulnerability Exploited in the Wild

Cybersecurity researchers have detected the active exploitation of a zero-day vulnerability in GeoVision devices,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild

A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution,...

Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability

Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing...