Major Vulnerabilities found in Car Sharing Apps in Android Devices as per Kaspersky Labs

Car Sharing attacks


Traffic is not just a nuisance for riders; it is also a public health hazard and disappointing news for the economy. Transportation studies reveal that the annual cost of congestion is $160 billion.
With Global warming at its peak, to avoid sun strokes, people prefer to travel in air conditioned cars even if it is out of their budget to own one. Though it is considered a necessity,  the global issues pertaining to the use of AC cars  cannot be ignored.
New travel alternatives devised by the latest technology have provided individuals with a vast number of  choices other than public transportation.
Requesting a ride from your phone is not only convenient;  sharing a ride with co- passengers or grabbing a bike outside your home have also had a positive social impact with respect to congestion, energy consumption and pollution.
Car Sharing Attack
This day by day growing popularity of car sharing has caught the eyes of the cyber criminals as well! They have already started to work  on the loopholes in the design on popular vehicle sharing apps to launch Car Sharing attacks to extort users.

Reasons to launch car Sharing attacks could be:

  1. Criminals may aspire to travel on somebody else’s expense. However, this is a short term benefit as after booking the first ride using someone else’s account would alert the owner who would most likely contact the service line support for being charged for the ride he/she never booked. The second attempt to book the ride from the same account is susceptible of being tracked and caught red handed. Hence this makes it a least possible scenario for hijacking someone else’s account.
  2. Most viable option would be to sell the hijacked account to someone who need to travel frequently but doesn’t own a driving license or have been refused registration to the app by the service’s security personnel.
  3. Additionally a car could be illicitly rented on someone else’s name and driven to a remote place to steal the car or its spare parts.
  4. Tracking someone’s ride to rob them would be another reason to hijack someone’s account.

Vulnerabilities in Android Apps that makes it susceptible to unauthorized access:


Comments

Popular posts from this blog

How to remove Speedtest-guide.com redirect from your system

The novel DNS protocol helps Mozart Malware evade detection

How to remove ZUpdater.exe Trojan from your system?