[go: up one dir, main page]

Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Android Malware Spoofs Uber's Interface to Steal Your Login

Symantec spotted the tactic in an Android Trojan circulating on third-party app stores.

By Michael Kan
January 4, 2018
Uber App

Security researchers have spotted Android malware with an appetite for Uber login information.

The trojan, which has been circulating on third-party app stores, goes after phone numbers and passwords for users of the ride-hailing service, according to the security firm Symantec.

SecurityWatch Once downloaded, the malware will spoof an Uber application interface over the phone's screen that asks for the login credentials. However, any data entered will actually be sent off to a remote server under the control of the malware's developers.

The malware is also quite persistent; the fake interface will pop up in regular intervals until the phone's owner finally enters their login information, Symantec said in a blog post.

Fake Uber App

After the credentials are entered, the malware employs another trick: it'll trigger the real Uber app to launch and activate a ride request. All of this looks like normal activity, but in reality it's the malware attempting to fool you into thinking nothing is wrong, Symantec said.

"This case again demonstrates malware authors' never-ending quest for finding new social engineering techniques to trick and steal from unwitting users," the company added.

Targeting ride-hailing users might sound strange. But in the past, stolen Uber accounts have been sold on the digital black market for around $4, giving buyers a cheap way to take car rides with the service.

"We believe attackers use Uber credentials for two purposes. First, to allow fraudsters to ride by charging an unsuspecting user. Second, to compile a fuller picture when stealing identities," the company said.

The good news is that Symantec hasn't found this app on the official Google Play Store. "Users are likely in Russian-speaking countries in limited number. We don't anticipate such an app to be in wide scale distribution," the company said.

Nevertheless, the trojan serves as a reminder it's best to download mobile software from official app stores, which have far less malware than third-party app stores.

How Your Password Was Stolen
PCMag Logo How Your Password Was Stolen

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Michael Kan

Senior Reporter

I've been with PCMag since October 2017, covering a wide range of topics, including consumer electronics, cybersecurity, social media, networking, and gaming. Prior to working at PCMag, I was a foreign correspondent in Beijing for over five years, covering the tech scene in Asia.

Read Michael's full bio

Read the latest from Michael Kan