Thursday, March 28, 2024

Tesla Sues Former Employee for Stealing Sensitive Data

Tesla, Inc., an American electric car manufacturing company based in Palo Alto, California has sued a former employee and software engineer named ‘Alex Khatilov’ alleging trade secret theft and breach of contract in his first week of working at the company.

Theft Of Confidential Files

The company accuses Khatilov of stealing code and files from WARP Drive, a back-end software system that Tesla developed to automate a range of business processes involved in manufacturing and selling its cars.

“They also accuse him of deleting possible evidence when security teams confronted him”, reads CNBC report.

The accused was hired to help Tesla’s Quality Assurance team create software that could automate tasks or business processes related to Environment, Health and Safety.

He started working for Tesla on December 28, 2020 and almost immediately began uploading files and scripts (written in a programming language called Python) to his Dropbox account. Tesla confronted him about his alleged theft on January 6th.

The code is of concern to Tesla because it could reveal to competitors “which systems Tesla believes are important and valuable to automate and how to automate them – providing a roadmap to copy Tesla’s innovation,” the complaint says.

Tesla’s security team detected the file downloads on January 6, after Khatilov was hired on December 28, and confronted him via video call as he was working from home, according to the court filing.

Tesla said during this call, Khatilov delayed sharing his screen with the team, during that period “he could be seen on video chat hurriedly deleting information from his computer.”

Earlier Tesla has sued ex-employees of trade theft. The company sued Guangzhi Cao for copying Autopilot source code to his personal accounts and devices in late 2018. That case is still in progress.

In the new complaint on Friday Tesla revealed that only 40 people of around 50,000 total employees work on the company’s Quality Assurance team that hired Khatilov.

The company also says it has spent an estimated “200 man-years of work” to develop the code in question.

Finally, Khatilov told the New York Post on Friday, that the software files ended up in his Dropbox by mistake. He was trying to make a backup copy of a folder on his computer, he told the newspaper, and unintentionally moved it to Dropbox. He was not aware Tesla was suing him until the newspaper reached out to him about the matter.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Facebook Taken Down Number of Political ads due to Technical Flaws in their System

Cisco Fixes High-severity Flaws in Webex, IP Cameras and ISE

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles