Jornalistas de vice-mãe disse que hackers, conhecido como L&M, informou-lhes sobre um acidente de quase 30 000 contas em duas Android-aplicações para GPS de monitoramento: iTrack (7000 contas) e ProTrack (20 000 contas).UMAs um resultado, hackers tem não só o acesso à informação sobre a localização dos carros, mas também oportunidade de controlar suas funções. Por exemplo, ele poderia desligar os motores in some cars remotely, in case if car was moving less than 20 km/h.
Applications with GPS tracking devices are widely spread in many countries. Por exemplo, eu&M compromised accounts in South America, Morocco, India and Philippines.
At L&M disposal were names and models of GPS-devices, their unique IDs (IMEIs, to be precise), full names, números de telefone, email – and mailing-addresses. Contudo, hacker confessed that full information was available not about all users.Journalists from Vice Motherboard checked L&M words, as connected with representatives of some of crushed accounts, the latter confirmed presented by hacker information.
«My target was the company, not the customers. Customers are at risk because of the company. They need to make money, and don’t want to secure their customers», — L&M told Motherboard in an online chat.
Hacker also noted that with the access he got, he could create major problems on roads worldwide. The fact is that L&M could not only trace users but also remotely drive some of their cars. He says there were several thousands of such cars.
iTryBrand Technology developed ProTrack application while for the creation of iTrack is responsible other Chinese firm, SEEWORLD. Both companies also sale hardware solutions and have cloud platforms through which their products can directly manage both users and retailers. eu&M argues that hacked accounts of such retailers.
eu&M says that he has already connected with ProTrack representatives and asked for the revenue for information about the vulnerability. He demonstrated journalists screenshots of messaging where develops try to reduce the price and ask questions:
“If we pay you, you will give us the tool and will not hack our account again? How can we make sure about this? Sorry for too many questions, this is the first time we meet this disaster.”
Finally L&M concludes that says he got what he wanted:
“They warned after my attack [sic], and that was a success for me. To force them take care about security,” L&M said. “They know now that their customers at risk, So they focused on how to secure their service, a little bit.”