Vehicle tracking devices developed to prevent vehicle theft, because of the security gaps they have the target of hackers. Bitdefender Turkey Operations Director Flame Akkoyunlu can easily infiltrate hackers to employees indicating device with a remote command system, hackers can stop vehicles on the move and also draws attention to the car owners can also access the personal information.
Research shows that vehicle tracking devices make an important contribution to reducing vehicle theft. In countries where such devices are compulsory, the rate of vehicle theft is down to 40%. However, the system Bitdefender pointed out that ignore basic security practices for developers Turkey Operations Director Flame Akkoyunlu, hackers to track vehicles such devices, alarms are expressed can be used to disable or personal information to steal.
Hackers Infiltrate Vehicle Tracking Devices
Vehicle tracking systems come with mobile applications that help vehicle owners track their vehicles in real time. Security researchers at Pen Test Partners tested the operation and reliability of some vehicle tracking devices used across Europe. The results they encountered showed that they could not verify whether the commands given to the device came from a reliable source. Alev Akkoyunlu, who points out that hackers can infiltrate applications in the face of this situation, which can be used to affect thousands of vehicles, draws attention to the fact that hackers can immobilize a vehicle in the middle of traffic and make it impossible to restart it.
Stop Thousands of Vehicles Simultaneously
Vehicle tracking devices work with an external command principle. The commands from the vehicles must come from the vehicle owner or an authorized call center at the request of the police. However, a hacker who seeps commands into this system can stop all vehicles on the move using the same vehicle tracking device. To start the vehicle, the vehicle monitoring device must be physically removed.
Access Personal Information Through Devices
Customer identification information in vehicle tracking systems can be deciphered when hackers access the application. Hackers who can change the e-mail address of any account registered in the application can also initiate a password reset process by sending the details they obtain to their own addresses. Alev Akkoyunlu, who draws attention to the fact that access to the vehicle, the phone number of all users and the authority to control all devices associated with the device can be obtained, states that hackers who monitor vehicles and users in real time can also cause more dangerous results.