Tesla Proves People are First Line of Cyber Defense

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines
Posted on September 1, 2020
Tesla symbol on wet car

Written by Raxis Research Team

By now, most of you have surely read or heard about the Tesla employee who turned down a lot of money to help a hacker break into the company. Who wouldn’t want $1 million to plug in a USB drive? As a business owner, how confident are you that an employee wouldn’t take this deal?

This is a fantastic story, and I’m happy to see the integrity of this employee. Yeah, a million dollars is amazing but he was part of a great story and took down someone that could have cost his employer millions more.  

This type of situation is extreme compared to most others we’ve seen. A lot of times it takes only $100 to convince a cleaning person or security guard to do this. Sometimes, just $50 can get an employee to open the door for an attacker so they can do it themselves.

And don’t forget about extortion. We’ve seen situations where a C-Level person was blackmailed into giving up a password to a system or plugging in a drive because an affair or some other secret was discovered. 

This story proves that people are watching and doing a very good job of knowing their staff. Technology can help in these types of situations but training and integrity are the keys here. This employee was honest and saved Tesla millions of dollars in potential ransom, not to mention the bad publicity and potential loss of intellectual property. 

I hope they rewarded him with the million dollars he was originally offered.

Raxis Research Team

Raxis Research Team

The Raxis Research Team is dedicated to staying ahead of the threat landscape. Our experts dig into emerging exploits, uncover hidden vulnerabilities, and develop resources that power our penetration testing engagements. By combining curiosity with technical precision, the team equips Raxis testers with cutting-edge intelligence to simulate real-world attacks and strengthen client defenses.

Search The Exploit Blog

Stay up to date with the latest in penetration testing

Name(Required)
Newsletter(Required)
Do you wish to join our newsletter? We send out emails once a month that cover the latest in cybersecurity news. We do not sell your information to other parties.