Home News New Malware Targeting the Uber App

New Malware Targeting the Uber App

0
SHARE

The malware found by the Symantec analysts pranks Uber’s Android application and yield clients’ passwords, enabling hackers to assume control over clients’ records. The malware isn’t far-reaching and most Uber clients are not affected by this.

How it happens

To take a client’s login data, the malware appears on-screen and asks the client to enter their Uber username and password. Once the client does this, the hacker has 100% control. To leave to trades, the malware utilizes deep links for the real app to show the client’s location. This way, it will be shown as the user is connecting to the actual app, instead of the fake one.It all started when Symantec learned that the hackers utilize deep links to find out the actual location of the client from the Uber app.

What is actually happening with this app?

Symantec stated that in order to abstain from disturbing the client, the malware shows a screen of the authentic application that demonstrates the client’s present location, which would not ordinarily stir doubt since that is what’s anticipated from the real application.

Be that as it may, by far, most of Uber clients are not in danger. The malware tries to trick people into thinking that it is the real app, yet it’s not accessible in the Google Play store and clients are most likely to need to get it from another place. From pieces of information, clients are in Russian-talking nations and in a limited number.

Keep trusted sources closer

In any case, it’s a decent keep-in-mind-thing for clients not to download applications from sources they don’t know so it should be a good idea to choose Google Play over others.