Tesla is cracking down on hackers who have figured out a way to utilize third-party programs to activate Full Self-Driving (FSD) in their vehicles — despite the suite not being approved for use in their country.
Tesla has launched a sweeping enforcement campaign against owners using third-party hardware hacks to activate FSD software in countries where the advanced driver-assistance system remains unregulated or unapproved.
In recent weeks, the company has begun remotely disabling FSD capabilities on affected vehicles, and in some instances, permanently revoking access even for owners who paid thousands of dollars for the feature.
Tesla has started remotely disabling Full Self-Driving on cars fitted with third-party CAN bus hacks in countries where the software is not yet approved.
This crackdown began after the hacks started spreading widely last month.
pic.twitter.com/wL8VqZuTlK — PiunikaWeb – helpful, and breaking tech news (@PiunikaWeb) April 9, 2026
Reports of the crackdown have surfaced across Europe, China, Japan, South Korea, and the UK, marking a significant escalation in Tesla’s efforts to enforce regional software restrictions.
FSD is Tesla’s flagship supervised autonomy package, which is available in several countries across the world. Currently limited by regulatory hurdles, it has not received full approval in most markets outside of the United States due to various things, such as safety standards, data privacy, and local traffic laws.
However, the company is working to expand its availability globally. Nevertheless, Tesla has installed the necessary hardware on vehicles globally, but locks the features based on geographic location.
Some owners have taken accessing FSD into their own hands, using jailbreak or bypass devices.
These “jailbreak” tools, typically €500 USB-style modules that plug into the vehicle’s Controller Area Network (CAN) bus, intercept signals to spoof approvals and unlock FSD, including advanced navigation, Autopark, and Summon features.
Hackers in Poland, Ukraine, and elsewhere have distributed the devices, with some claiming they work on HW3 and HW4 vehicles and can be unplugged to restore stock settings. In China alone, over 100,000 owners reportedly installed such modifications.
Tesla’s response has been swift and uncompromising. Recently, the company began sending in-car notifications and emails warning owners that unauthorized modifications violate terms of service, compromise vehicle safety systems, and expose cars to cybersecurity risks.
The email communication read:
“Your vehicle has detected an unauthorized third-party device. As a precaution, some driver assistance functions have been disabled for safety reasons. A software update will be available soon. Once you install the update, some features may be enabled again.”
Vehicles detected using the hacks have had FSD capabilities remotely disabled without refund. In some cases, owners report permanent bans, even if they had legitimately purchased the software package.
Tesla’s hardline stance underscores its commitment to regulatory compliance and safety.
Tesla has long argued that unsupervised FSD requires rigorous validation, and premature activation could endanger drivers and bystanders.
The crackdown sends a clear-cut message to those who are bypassing the FSD safeguards, but there are greater implications for Tesla if something were to go wrong. This is an understandable way to protect the company’s reputation for its FSD suite.
The post Tesla hits FSD hackers with surprise move appeared first on TESLARATI.
