Tuesday, March 4, 2025
HomeHacksGPS Tracking Apps Flaw Let Hackers Remotely Hijack the Car & Kill...

GPS Tracking Apps Flaw Let Hackers Remotely Hijack the Car & Kill Engines to Create a Traffic Jam

Published on

SIEM as a Service

Follow Us on Google News

A critical security flaw in GPS Tracking Apps that allows remote hackers to hijack the car and kill the engine while the car moving on the road.

A Hacker who reportedly shared details with Motherboard that he broke into thousands of accounts belonging to users of two GPS tracker apps
 iTrack and ProTrack.

He compromised more than 7,000 iTrack accounts and more than 20,000 ProTrack accounts that managed by the respective car owners to
use to monitor and manage fleets of their vehicles through GPS tracking devices.

Protrack is a professional Web-based GPS tracking software. A lot of customers from all over the world are using this software to provide live tracking service to the car owners.

iTrack is another app that provides GPS Tracking Security Systems, GPS Security System India, vehicle tracking system, vehicle protection, fleet management system.

Due to the critical security bug in both GPS tracking apps, he brute-forced “millions of usernames” via the apps’ API. Then, he said he wrote a script to attempt to login using those usernames and the default password.

This Flaw let the hacker to automatically break into thousands of accounts who all are using the default password.

Also, the hacker claims that he can track vehicles in some many countries around the world, including South Africa, Morocco, India, and the Philippines.

The hacker shared the alot more information to Motherboard including, name and model of the GPS tracking devices they use, the devices’ unique ID numbers (technically known as an IMEI number); usernames, real names, phone numbers, email addresses, and physical addresses. (According to L&M, he was not able to get all of this information for all users; for some users he was only able to get some of the above information.)

This data breach legitimacy was checked by the motherboard with some of the users and confirmed that the data provided by the hackers was completely original.

Hacker was never tried to kill any cars engine and he didn’t provide any evidence that he can do that. but one of the hardware GPS maker said “customers can turn off the engines remotely if the vehicles are going under 20 kilometers per hour”

GPS Tracking Apps


“My target was the company, not the customers. Customers are at risk because of the company,” L&M told Motherboard in an online chat. “They need to make money, and don’t want to secure their customers.” Hacker said.

ProTrack denied the data breach via email, but confirmed that its prompting users to change passwords.

“Our system is working very well and change password is normal way for account security like other systems, a company representative said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

PASTA – A New Car Hacking Tool Developed by Toyota to Test The Security Vulnerabilities

Modern Cars are Vulnerable to Hacking and Malware Attack

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cl0p Ransomware Hide Itself on Compromised Networks After Exfiltrate the Data

The Cl0p ransomware group, a prominent player in the cybercrime landscape since 2019, has...

Ratatouille Malware Bypass UAC Control & Exploits I2P Network to Launch Cyber Attacks

A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity...

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks...