Researchers discover a fake Uber application is tricking Android users into sharing their credentials with hackers.

Kelly Sheridan, Former Senior Editor, Dark Reading

January 3, 2017

3 Min Read

A new form of Android malware tricks users into entering their credentials on a fake Uber app that connects to the real one.

Symantec analysts discovered the malware - which hides its data theft via so-called "deep links" that connect the phony app to the legitimate Uber app - last year while researching new variants of Android.Fakeapp, or malicious fake apps. There are thousands of fake apps, says Vikram Thakur, technical director of security response at Symantec. All are built with different motivations: data theft, credential theft, phishing, battery drainage, photo theft.

This particular fake app is attempting to lift Uber credentials. Its UI regularly pops up on victims' screens until they enter their Uber ID (usually phone number) and password. Once the user clicks "Next," it sends their credentials to an attacker's remote server, Thakur explains.

"From a technical standpoint, we saw the author of the malicious app trying to use what we call deep links," he says. Deep links are URLs that link to specific content in an app: Developers embed them so users can directly launch an application from a webpage or another app. For example, a deep link in a news app might directly link to a weather app when clicked.

The "Next" button users press after entering their Uber credentials into the spoofed UI is a deep link, which connects them to the legitimate Uber app. As their information is sent to the control server, users are directed to Uber's Ride Request page with their current location loaded. It's "a clever mechanism" the attacker is using to cover their tracks, Thakur says.

What's key here is not the scope of the attack but the strategy behind it. "This is the first time we've one of these fake applications making use of deep links," he notes.

Attackers have always evolved with available technology, Thakur continues. Once deep links became common in mobile apps, it was "only a matter of time" before they started to use them for nefarious purposes. It's a tradeoff, he says. Users and developers benefit from the convenience of new tech but have the downside of cybercriminals taking advantage.

This specific application was tailored toward Russian-speaking users and has not reached many people. Symantec's researchers only have visibility into devices on which its products are installed; from that perspective, the number of people who have downloaded this app is small.

Legitimate app stores like Google Play don't host the spoofed app, so anyone who downloads it would have to access a third-party site. Thakur says the attacker may have also attempted to peddle this app as an update to another legitimate application like Flash.

There are two reasons why someone would steal Uber credentials. An attacker may want to sell them on the Dark Web so buyers get free rides, or provide access to a broader set of data. Uber IDs can be used to access someone's number of rides, home address, email address, and other personal details.

"It plays an avid piece in one's identity," says Thakur. "When it comes to identity theft, there is a lot more information available about a certain individual, including their ride sharing or travel habits … stealing Uber credentials might be an extra piece into one's identity when they are sold on the underground."

Android users should limit their app downloads to stores where they have established trust, he explains. Vendors should note that deep links are not only used for legitimate purposes by legitimate authors. Users should also pay attention to notifications. If you're prompted to enter Uber credentials while in another app, there's a "high likelihood" you have a malicious app.

Related Content:

About the Author(s)

Kelly Sheridan

Former Senior Editor, Dark Reading

Kelly Sheridan was formerly a Staff Editor at Dark Reading, where she focused on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial services. Sheridan earned her BA in English at Villanova University. You can follow her on Twitter @kellymsheridan.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights