Fake Uber App Hides Credential Theft with Deep Links

  /     /     /  
Publicated : 22/11/2024   Category : security


Fake Uber App Hides Credential Theft with Deep Links


Researchers discover a fake Uber application is tricking Android users into sharing their credentials with hackers.



A new form of Android malware tricks users into entering their credentials on a fake Uber app that connects to the real one.
Symantec analysts discovered the malware - which hides its data theft via so-called deep links that connect the phony app to the legitimate Uber app - last year while researching new variants of Android.Fakeapp, or malicious fake apps. There are thousands of fake apps, says Vikram Thakur, technical director of security response at Symantec. All are built with different motivations: data theft, credential theft, phishing, battery drainage, photo theft.
This particular fake app is attempting to lift Uber credentials. Its UI regularly pops up on victims screens until they enter their Uber ID (usually phone number) and password. Once the user clicks Next, it sends their credentials to an attackers remote server, Thakur explains.
From a technical standpoint, we saw the author of the malicious app trying to use what we call deep links, he says. Deep links are URLs that link to specific content in an app: Developers embed them so users can directly launch an application from a webpage or another app. For example, a deep link in a news app might directly link to a weather app when clicked.
The Next button users press after entering their Uber credentials into the spoofed UI is a deep link, which connects them to the legitimate Uber app. As their information is sent to the control server, users are directed to Ubers Ride Request page with their current location loaded. Its a clever mechanism the attacker is using to cover their tracks, Thakur says.
Whats key here is not the scope of the attack but the strategy behind it. This is the first time weve one of these fake applications making use of deep links, he notes.
Attackers have always evolved with available technology, Thakur continues. Once deep links became common in mobile apps, it was only a matter of time before they started to use them for nefarious purposes. Its a tradeoff, he says. Users and developers benefit from the convenience of new tech but have the downside of cybercriminals taking advantage.
This specific application was tailored toward Russian-speaking users and has not reached many people. Symantecs researchers only have visibility into devices on which its products are installed; from that perspective, the number of people who have downloaded this app is small.
Legitimate app stores like Google Play dont host the spoofed app, so anyone who downloads it would have to access a third-party site. Thakur says the attacker may have also attempted to peddle this app as an update to another legitimate application like Flash.
There are two reasons why someone would steal Uber credentials. An attacker may want to sell them on the Dark Web so buyers get free rides, or provide access to a broader set of data. Uber IDs can be used to access someones number of rides, home address, email address, and other personal details.
It plays an avid piece in ones identity, says Thakur. When it comes to identity theft, there is a lot more information available about a certain individual, including their ride sharing or travel habits … stealing Uber credentials might be an extra piece into ones identity when they are sold on the underground.
Android users should limit their app downloads to stores where they have established trust, he explains. Vendors should note that deep links are not only used for legitimate purposes by legitimate authors. Users should also pay attention to notifications. If youre prompted to enter Uber credentials while in another app, theres a high likelihood you have a malicious app.
Related Content:
Intel Processor Security Flaw Prompts Kernel Makeovers in Linux, Windows
In Mobile, Its Back to the Future
17 Things We Should Have Learned in 2017, but Probably Didnt
The Financial Impact of Cyber Threats

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Fake Uber App Hides Credential Theft with Deep Links