RedLock unveiled a new cryptojacking case targeting Tesla's Amazon Web Service (AWS) software, reported yesterday the RedLock blog, February 20th.

Hackers accessed Tesla's AWS credentials by entering a password-protected Kubernetes software container. The hackers then used the Kubernetes container to extract cryptocurrences, for a still unknown duration.

The RedLock CSI team exposed a similar hacking of AWS to Bitcoin Mining (BTC) in the Aviva and Gemalta companies. October of last year. These companies, like Tesla, did not have a password for their console consoles.

The Tesla hack was well disguised – the hackers were not using an already known mining pool, but were putting it in their own software mining pool to link the malicious script to an endpoint "not listed" which complicates the detection of any suspicious activity.

Hackers also reduced their CPU usage to avoid being spotted the IP address of the mining pool behind the CloudFlare free content delivery network, RedLock reports.

Tesla had already made a new way last year to use its technologies to exploit Bitcoin in a completely unexpected way. In December 2017, the owner of an electric car Tesla S reported that he had mined Bitcoin with the compressor of his car, placing a mining platform in the trunk

The blog of RedLock detailing the hack, entitled, "The Lessons of the Cryptojacking Attack at Tesla", ends with suggestions to companies to prevent similar cryptojacking incidents in the future, namely to monitor the configurations , network traffic and suspicious behavior of users

"at least [using] a password."