Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Google Maps Hacks - 99 smartphones for free roads!
Security Awareness

Google Maps Hacks - 99 smartphones for free roads!

Most people appreciate the features of navigation Apps in smartphones - but how easy are Google Maps Hacks to implement? One artist show how easy it is.

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: October 7, 2024 2 min read read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)

TL;DR

Artist Simon Weckert demonstrated a Google Maps hack by loading 99 second-hand smartphones into a handcart and walking through Berlin streets. Because Google Maps interprets many slow-moving devices as traffic congestion, the cart created a virtual traffic jam on otherwise empty roads. The experiment reveals how crowd-sourced navigation data can be manipulated without any traditional cyberattack, raising questions about the reliability of real-time mapping services.

Table of Contents (1 sections)

Most people appreciate the features of integrated navigation tips in smartphones - but how easy are Google Maps Hacks to implement? One artist shows that it is frighteningly easy. And the fascinating consequences of manipulation. For the hack itself, a lot of smartphones are needed. In this case, second hand smartphones will do. 99 of them to be exact. Google Maps Hacks - 99 Smartphones

It is that easy to clear the streets. 99 second-hand smartphones in a cart (source: simonweckert.com)

Clear the road with 99 second hand smartphones

The success of Google Maps is undisputed. Quite a few people use the app to commute regularly. If the route is congested, it is worth taking a look at the display early in the morning. Until now, there was little doubt that the information displayed was not correct. So far. Simon Weckert has now come up with an idea: The traffic jam display on Google Maps appears when many devices cannot move forward. As can be seen in Simon's handcart, there are some smartphones there that make very slow progress. This is interpreted by Google Maps as a traffic jam. And since there are many devices, it is also a big, red traffic jam. This can also be seen on the screenshots. The whole thing happened in Berlin and shows that this technology can also be manipulated. Google Maps Hacks - Stau Anzeige

The handcart creates an enormous traffic jam. At least digitally. In reality everything is free. (Quelle: Simonweckert.com)

Google Maps Hacks are possible - but with effort.

Simon's experiment shows that even this technology is far from infallible. The attacks on the reliability of information are simply different from classic cyber attacks. If you can't imagine how it all works live, you can take a look at Simon's video. Empty streets and surprised fellow citizens* can be discovered there. However, the probability that the traffic jam on the A2 is caused by someone with a handcart is quite low. Basically it does not hurt to drive without a navigation system. Maybe you will be happy, like the cars in Berlin, about the one or other free road. https://www.youtube.com/watch?v=k5eL\_al\_m7Q

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAV