The trick that let hackers keep tracking Waze users after it was ‘fixed’
Earlier this year, Fusion reported that hackers had found a way to track the movements of people using Google’s navigation app Waze. Because of the social nature of the app, which shows you other Waze drivers on the road, a clever attacker can collect information about other drivers’ whereabouts. A team of grad students led by University of California-Santa Barbara professor Ben Zhao proved this was possible by stalking me (with my permission, of course).
After the story came out in April, Waze issued a defensive blog post that implied that the team had only been able to track me because I had given them my Waze username and the starting location of my trips. It also announced it had come up with a fix to prevent its users from being tracked.
So I went back to Zhao and his grad students to ask if the fix worked. It didn’t.
Zhao and the students were able to see what Waze had done. For older versions of the app, it had turned off social elements, so users could no longer see one another, making the spying impossible. For the newest version of the app, Waze had turned off the broadcasting of users’ nicknames to one another (unless they’re friends) and stopped collecting information about the very beginning of someone’s trip and the very end (so that you couldn’t put a tracker on someone’s house and see when they left). It has also obfuscated the communication between a user’s device and Waze’s back-end servers, so that an attacker wouldn’t be able to make their program talk to Waze’s servers. But all of this was for naught: grad student Bolun Wang was able to decode the obfuscated communication in just a day. (Waze should probably think about hiring him.)
Despite the Waze updates, the team was able to once again make their software talk to Waze’s back-end servers and fill the app with ghost cars that could track other users. They could still track me with disturbing accuracy, for example, during this trip in May: