4.9 • 696 Ratings
🗓️ 25 July 2017
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, July 25th, 2017 edition of the Sandinert Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Washington, D.C. |
0:13.1 | Renato today had an interesting diary about how Uber drivers are being defrauded via social engineering. A lot of these social |
0:23.4 | engineering tricks are really what we are seeing being used these days. So even if you're |
0:28.2 | not an Uber driver not associated with Uber, it may still be interesting to see through |
0:34.2 | what lengths social engineering attacks go in order to defraud their victim. |
0:40.6 | The attacker in this case will request a ride via the Uber app. When you request a ride via Uber, |
0:47.9 | you'll receive contact details for the driver to contact the driver even through the Uber app without having to reveal your own caller ID. |
1:00.0 | Now in this particular case, the hacker takes advantage of this feature and calls the driver claiming to be an Uber representative. |
1:10.0 | Because the call will arrive through the Uber |
1:13.4 | app in this case, the driver somewhat trusts the origin of the call and to further authenticate |
1:19.8 | the caller will then claim that, well, they of course know what customer the driver is supposed |
1:25.8 | to pick up. But the attacker will tell them that another |
1:30.0 | driver will take care of this particular pickup. |
1:32.9 | They first need to fix that particular driver's account in order for the driver to be properly |
1:40.6 | credited for their Uber work. So this is where the attack starts for real. |
1:47.6 | The caller will ask the driver for an email address. |
1:51.9 | Then to further authenticate the driver, the caller claims that they will send an SMS |
1:59.0 | message to the driver's phone. What's actually happening now is |
2:03.5 | that the caller will do a password reset on that email address. Many email services, of course, |
2:10.8 | will authenticate the password reset via an SMS message. So the caller just asked the driver |
2:17.1 | for whatever code they received, |
2:19.7 | will of course acknowledge that this code was correct and then use it in order to reset |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.