Hacker broke out Android application for GPS-monitoring and took control over several thousands of cars

Journalists from Vice Motherboard told that hacker, known as L&M, reported them about a crash of nearly 30 000 accounts in two Android-applications for GPS-monitoring: iTrack (7000 accounts) and ProTrack (20 000 accounts).

ENs a result, hacker got not only access to information about cars’ location, but also opportunity to control their functions. For eksempel, he could turn off engines in some cars remotely, in case if car was moving less than 20 km/h.

Applications with GPS tracking devices are widely spread in many countries. For eksempel, L&M compromised accounts in South America, Morocco, India and Philippines.

At L&M disposal were names and models of GPS-devices, their unique IDs (IMEIs, to be precise), full names, phone numbers, email – and mailing-addresses. derimot, hacker confessed that full information was available not about all users.

Hacked cars in Morocco
A screenshot of the hacked account of a user
Journalists from Vice Motherboard checked L&M words, as connected with representatives of some of crushed accounts, the latter confirmed presented by hacker information.

«My target was the company, not the customers. Customers are at risk because of the company. They need to make money, and don’t want to secure their customers», — L&M told Motherboard in an online chat.

Hacker also noted that with the access he got, he could create major problems on roads worldwide. The fact is that L&M could not only trace users but also remotely drive some of their cars. He says there were several thousands of such cars.

iTryBrand Technology developed ProTrack application while for the creation of iTrack is responsible other Chinese firm, SEEWORLD. Both companies also sale hardware solutions and have cloud platforms through which their products can directly manage both users and retailers. L&M argues that hacked accounts of such retailers.

L&M says that he has already connected with ProTrack representatives and asked for the revenue for information about the vulnerability. He demonstrated journalists screenshots of messaging where develops try to reduce the price and ask questions:

“If we pay you, you will give us the tool and will not hack our account again? How can we make sure about this? Sorry for too many questions, this is the first time we meet this disaster.”

Finally L&M concludes that says he got what he wanted:

“They warned after my attack [sic], and that was a success for me. To force them take care about security,” L&M said. “They know now that their customers at risk, So they focused on how to secure their service, a little bit.”

Kilde: https://motherboard.vice.com

Om Trojan Killer

Carry Trojan Killer Portable på minnepinne. Vær sikker på at du er i stand til å hjelpe din PC motstå eventuelle cyber trusler uansett hvor du går.

Sjekk også

MageCart på Heroku Cloud Platform

Forskere fant flere MageCart Web Skimmers På Heroku Cloud Platform

Forskere ved Malwarebytes rapportert om å finne flere MageCart web skimmere på Heroku Cloud Platform …

Android spyware CallerSpy

CallerSpy spyware masker som en Android-chat program

Trend Micro eksperter oppdaget malware CallerSpy, som masker som en Android-chat program og, …

Legg igjen et svar