Hacker brach Android-Anwendung für GPS-Überwachung und übernahm die Kontrolle über mehrere Tausende von Autos

Journalisten aus Vice Motherboard sagte, dass Hacker, bekannt als L&M, zu einem Absturz berichtete sie von fast 30 000 Konten in zwei Android-Anwendungen für GPS-Überwachung: iTrack (7000 Konten) und ProTrack (20 000 Konten).

EINs a result, Hacker bekam nicht nur den Zugang zu Informationen über Autos Lage, sondern auch Gelegenheit, ihre Funktionen zu steuern. Zum Beispiel, er konnte ausschalten Motoren in some cars remotely, in case if car was moving less than 20 km/h.

Applications with GPS tracking devices are widely spread in many countries. Zum Beispiel, L&M compromised accounts in South America, Morocco, India and Philippines.

At L&M disposal were names and models of GPS-devices, their unique IDs (IMEIs, to be precise), full names, phone numbers, email – and mailing-addresses. jedoch, hacker confessed that full information was available not about all users.

Hacked cars in Morocco
A screenshot of the hacked account of a user
Journalists from Vice Motherboard checked L&M words, as connected with representatives of some of crushed accounts, the latter confirmed presented by hacker information.

«My target was the company, not the customers. Customers are at risk because of the company. They need to make money, and don’t want to secure their customers», — L&M told Motherboard in an online chat.

Hacker also noted that with the access he got, he could create major problems on roads worldwide. The fact is that L&M could not only trace users but also remotely drive some of their cars. He says there were several thousands of such cars.

iTryBrand Technology developed ProTrack application while for the creation of iTrack is responsible other Chinese firm, SEEWORLD. Both companies also sale hardware solutions and have cloud platforms through which their products can directly manage both users and retailers. L&M argues that hacked accounts of such retailers.

L&M says that he has already connected with ProTrack representatives and asked for the revenue for information about the vulnerability. He demonstrated journalists screenshots of messaging where develops try to reduce the price and ask questions:

“If we pay you, you will give us the tool and will not hack our account again? How can we make sure about this? Sorry for too many questions, this is the first time we meet this disaster.”

Finally L&M concludes that says he got what he wanted:

“They warned after my attack [sic], and that was a success for me. To force them take care about security,” L&M said. “They know now that their customers at risk, So they focused on how to secure their service, a little bit.”

Quelle: https://motherboard.vice.com

Über Trojan Mörder

Tragen Sie Trojan Killer-Portable auf Ihrem Memory-Stick. Achten Sie darauf, dass Sie in der Lage sind, Ihr PC keine Cyber-Bedrohungen widerstehen zu helfen, wo immer Sie sind.

überprüfen Sie auch

MageCart auf der Heroku Cloud Platform

Die Forscher fanden mehrere MageCart Web Skimmer Auf Heroku Cloud Platform

Forscher an Malwarebytes berichteten über mehr MageCart Web-Skimmer auf der Heroku Cloud-Plattform zu finden, …

Android Spyware CallerSpy

CallerSpy Spyware Masken als Android-Chat-Anwendung

Trend Micro Experten entdeckt die Malware CallerSpy, die Masken als Android-Chat-Anwendung, und, …

Hinterlasse eine Antwort