{"id":3790,"date":"2018-06-20T21:01:18","date_gmt":"2018-06-20T21:01:18","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/"},"modified":"2018-06-20T21:01:18","modified_gmt":"2018-06-20T21:01:18","slug":"tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/","title":{"rendered":"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind"},"content":{"rendered":"<p>Tesla has sued a bloke it claims was behind an effort to sabotage the electric car maker by leaking its confidential blueprints.<\/p>\n<p>A <a target=\"_blank\" href=\"https:\/\/regmedia.co.uk\/2018\/06\/20\/teslavtrippcomplaint.pdf\">complaint<\/a> [PDF] lodged with the Nevada US District Court today names Martin Tripp, a former technician at the Tesla Nevada Gigafactory plant, as the alleged culprit behind a string of hacking and data leaks.<\/p>\n<p>It comes on the heels of the revelation from founder Elon Musk that Tesla was the victim of a massive insider attack aimed at derailing its car business.<\/p>\n<p>&#8220;Tesla has only begun to understand the full scope of Tripp\u2019s illegal activity, but he has thus far admitted to writing software that hacked Tesla\u2019s manufacturing operating system (\u201cMOS\u201d) and to transferring several gigabytes of Tesla data to outside entities,&#8221; Tesla&#8217;s lawsuit claimed.<\/p>\n<p>&#8220;This includes dozens of confidential photographs and a video of Tesla\u2019s manufacturing systems.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Infection<\/span><\/h3>\n<p>According to Tesla&#8217;s complaint, Tripp was able to slip a piece of malware onto three different machines at the Nevada Gigafactory where the automaker assembles the batteries for its cars.<\/p>\n<p>That software nasty, allegedly written by Tripp himself, collected and exported &#8220;several gigabytes&#8221; of confidential information outside of Tesla&#8217;s networks. From there, it is alleged, Tripp handed the data to unnamed third parties.<\/p>\n<p>&#8220;His hacking software was operating on three separate computer systems of other individuals at Tesla so that the data would be exported even after he left the company and so that those individuals would be falsely implicated as guilty parties,&#8221; Tesla claimed.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/08\/22\/layoffs_fired_rif.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"tesla\"\/><\/p>\n<h2 title=\"Nine per cent of workers to be given their marching orders\">Tesla undecimates its workforce but Elon insists everything&#8217;s absolutely fine<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/06\/12\/tesla_undecimates_its_workforce_but_everythings_absolutely_fine\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>In addition to the hacking of confidential information, Tesla also alleged that Tripp fabricated damaging tales about the company and passed them to journalists.<\/p>\n<p>&#8220;Tripp also made false claims to the media about the information he stole. For example, Tripp claimed that punctured battery cells had been used in certain Model 3 vehicles even though no punctured cells were ever used in vehicles, batteries or otherwise,&#8221; Tesla&#8217;s suit claimed.<\/p>\n<p>&#8220;Tripp also vastly exaggerated the true amount and value of &#8216;scrap&#8217; material that Tesla generated during the manufacturing process, and falsely claimed that Tesla was delayed in bringing new manufacturing equipment online.&#8221;<\/p>\n<p>The suit comes after weeks of Musk <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/05\/24\/musk_antimedia_rant\/\">feuding with the press<\/a> over unflattering stories about both Tesla&#8217;s <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/04\/18\/super_cali_investigators_tesla_blood_awoke_us\/\">factory conditions<\/a> and the safety of <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/06\/07\/tesla_crash_report\/\">the cars themselves<\/a>.<\/p>\n<p>It appears that Tripp is being blamed at least in part for that unflattering coverage, and Tesla wants to extract a pound of flesh in retaliation.<\/p>\n<p>In addition to a $1,000,000 damages bill, Tesla is asking the judge to allow it to inspect Tripp&#8217;s phone, home computer, and his email accounts &#8220;to determine the extent to which Tesla trade secrets were wrongfully taken and\/or disseminated to others.&#8221;<\/p>\n<p>Tripp has yet to file a response in court, and no date has been set for the next hearing in the case. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/06\/20\/tesla_names_former_gigafactory_hand_as_sabotage_mastermind\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Musk blames bad Tripp, drags fella into lawsuit Tesla has sued a bloke it claims was behind an effort to sabotage the electric car maker by leaking its confidential blueprints.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3791,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-3790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-20T21:01:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind\",\"datePublished\":\"2018-06-20T21:01:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/\"},\"wordCount\":507,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/\",\"name\":\"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg\",\"datePublished\":\"2018-06-20T21:01:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/","og_locale":"en_US","og_type":"article","og_title":"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-20T21:01:18+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind","datePublished":"2018-06-20T21:01:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/"},"wordCount":507,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/","url":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/","name":"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg","datePublished":"2018-06-20T21:01:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tesla-fingers-former-gigafactory-hand-as-alleged-blueprint-leaking-sabotage-mastermind\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Tesla fingers former Gigafactory hand as alleged blueprint-leaking sabotage mastermind"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3790"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3790\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3791"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}