A critical security flaw in GPS Tracking Apps that allows remote hackers to hijack the car and kill the engine while the car moving on the road.
He compromised more than 7,000 iTrack accounts and more than 20,000 ProTrack accounts that managed by the respective car owners to
use to monitor and manage fleets of their vehicles through GPS tracking devices.
Protrack is a professional Web-based GPS tracking software. A lot of customers from all over the world are using this software to provide live tracking service to the car owners.
iTrack is another app that provides GPS Tracking Security Systems, GPS Security System I
Due to the critical security bug in both GPS tracking apps, he brute-forced “millions of usernames” via the apps’ API. Then, he said he wrote a script to attempt to login using those usernames and the default password.
This Flaw let the hacker to automatically break into thousands of accounts who all are using the default password.
Also, the hacker claims that he can track vehicles in some many countries around the world, including South Africa, Morocco, India, and the Philippines.
The hacker shared the
This data breach legitimacy was checked by the motherboard with some of the users and confirmed that the data provided by the hackers was completely original.
Hacker was never tried to kill any cars engine and he didn’t provide any evidence that he can do that. but one of the hardware GPS maker said “customers can turn off the engines remotely if the vehicles are going under 20 kilometers per hour”
“My target was the company, not the customers. Customers are at risk because of the company,” L&M told Motherboard in an online chat. “They need to make money, and don’t want to secure their customers.” Hacker said.
ProTrack denied the data breach via email, but confirmed that its prompting users to change passwords.
“Our system is working very well and change password is normal way for account security like other systems, a company representative said.
Download Free E-book to learn about complete Enterprise Security Implementation & Mitigation Steps – Download Free-Ebook Here.