How to hack a phone: 7 common attack methods explained
Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.
Thinkstock
By Josh Fruhlinger
Contributing writer, CSO
NOV 2, 2021 2:00 AM PT
The smartphone revolution was supposed to provide a second chance for the tech industry to roll out a secure computing platform. These new devices were purported to be locked down and immune to malware, unlike buggy PCs and vulnerable servers.
But it turns out that phones are still computers and their users are still people, and computers and people will always be weak links. We spoke to a number of security experts to help you get a sense of the most common ways attackers might go about breaking into the powerful computers in your users’ pockets. This should hopefully give you perspective on potential vulnerabilities.
7 ways to hack a phone
Social engineering
Malvertising
Smishing
Malware
Pretexting
Breaking in via Bluetooth
Man-in-the-middle Wi-Fi attacks
1. Social engineering
The easiest way for any hacker to break into any device is for the user to open the door themselves. Making that happen is easier said than done, of course, but it's the goal of most forms of social engineering attacks.
Smartphone operating systems generally have stricter security regimes than PCs or servers, with application code running in a sandboxed mode that prevents it from escalating privileges and taking over the device. But that much vaunted security model, in which mobile users need to take affirmative action in order for code to access protected areas of the phone's operating system or storage, has a drawback: it results in an abundance of pop-up messages that many of us learn to tune out. "Applications on mobile devices segregate permissions in order to protect the user from rogue apps having a free for all with your data," says Catalino Vega III, Security Analyst at Kuma LLC. "The prompt becomes familiar: 'Do you want to allow this application access to your photos?'"
"This really adds just a single step between the provisioning of that access to the application," he continues. "And because of the way the user experience has conditioned the acceptance of most prompts as a gate to accessing functionality, most users will just allow the app access to whatever it is requesting. I think this may be something we are all guilty of at some point."
2. Malvertising
One particularly important vector for these kinds of deceptive dialog boxes are so-called "malvertisements," which piggyback onto the infrastructure developed for the mobile advertising ecosystem, whether in a browser or within an app.
"The goal is to get you to click on the advertisement," says Chuck Everette, Director of Cybersecurity Advocacy at Deep Instinct. "They are trying to lure you in with something that will get you to click before you think—a knee-jerk reaction, or something that looks like an alert or warning." The aim, he says, is to "try and scare you or tempt you into clicking on the link."
One example he cites was a game called Durak, which would coax users into unlocking their Android phones by tricking them into turning off security features and installing other malicious applications. Far from being some dodgy off-label sideloaded app, Durak was available in the official Google Play marketplace. "67% of all malicious apps can be traced back to being downloaded from the Google Play store, while only 10% came from alternative third-party party markets," he explains. "Consumers on Google Play greatly rely on reviews from other users if the app is safe or not. This does not work." In contrast, he says, "Apple closely inspects every app on its app store, which decreases the number of apps available—but greatly reduces apps that are reported to be malicious."
all tips and tricks by blogger....
Comments
Post a Comment