RING C-UAS
CONTACT US
1 min read

2 years since the Tesla GPS hack

Featured Image

In June 2019, Regulus Cyber's experts successfully spoofed the GPS system of a Tesla Model 3 vehicle. This experiment provided an important warning for all companies using GNSS technology– that these location and timing technologies that they depend on are highly vulnerable to spoofing attacks.

In the 2 years since the experiment, companies and governments have continued to research the potential of harm that can be caused by spoofing attacks, and are learning more on how to defend themselves from it.

The Tesla hack experiment and its results were eye-opening for the autonomous vehicles sector – the danger is real and rising as more and more vehicles are depending on GNSS technology as part of their sensors for assisted or automated driving. Up to 97% of new vehicles since 2019, include GNSS receivers in them, most if not all are still vulnerable to the same spoofing attacks presented in the research.

Moreover, WP.29, The UN’s World Forum for Harmonization of Vehicle Regulations, has issued Regulation No. 155 in January 2021, to set proper guidelines for cybersecurity in the automotive industry with the goal of addressing every possible cyber threat that the automotive industry might have encountered - including GNSS spoofing.

Tesla info 2 years

These upcoming regulatory requirements can make the difference between life and death situations caused by the GNSS Spoofing, and ensure that only reliable and resilient positioning is used within vehicles, both today and in the future.

Learn More About Automotive (ADAS) Solutions