Smartphones Are More Vulnerable Than You Think

Today, most people from 10 to 85 have a smartphone, although most of these users are unaware just how vulnerable to attacks these devices are.

In most cases, attacks on smartphones require physical access to the device and interactions with the touchscreen, but according to new academic research, it is possible to reach users' mobile touchscreen without touching it using electro-magnetic interference.

Modern Android smartphones are susceptible to a new type of attack named "GhostTouch" by researchers at China's Zhejiang University and the Technical University of Darmstadt that can induce fake finger taps to take unwanted actions that can execute taps and swipes on the phone’s screen, even from a distance of up to 40 mm. 

The attack exploits flaws at both the software and hardware level and has been proven to work even against the most recent smartphone models. 

GhostTouch uses electromagnetic interference (EMI) to inject fake touch points into a touchscreen without the need to physically touch it. By tuning the parameters of the electromagnetic signal and adjusting the antenna, we can inject two types of basic touch events, taps and swipes, into targeted locations of the touchscreen and control them to manipulate the underlying device.

According to the researchers’ findings, an attacker can use GhostTouch to carry out several types of malicious actions, including initiating calls and downloading malware.

Most of the touchscreens used today by smartphone and tablet companies are sensitive and vulnerable to the environmental impact of EMI. Previous studies have shown that EMI can disrupt the user experience of touchscreens and possibly cause random and harmful behavior. In one case, a phone that was placed on a charger booked a highly expensive hotel room because of EMI signals.

Researchers created the GhostTouch software in order to see if they could use EMI to create controllable touch events and trigger arbitrary behavior on touchscreens.

The core idea behind GhostTouch is to interfere with the capacitance measurement of touchscreens using electromagnetic signals injected into the receiving electrodes integrated into the touchscreen. GhostTouch is a targeted attack. The adversary must know the model and make use of the victim’s phone in order to tune the equipment. The attacker might also need extra information about the phone, such as the passcode, which they must acquire through social engineering or ‘shoulder surfing’.

These types of attacks usually occur in public locations such as cafes, open offices, libraries, etc. Places where people are not necessarily careful of how they place their smart devices. By embedding appropriate equipment under a specific table, the hacker will be able to launch attacks remotely.

The researchers tested GhostTouch on 11 widely used phone models and were able to implement the attack with varying degrees of success on nine models, demonstrating that EMI attacks are a real threat to today’s personal devices.

Mobile Phone Quality Is An Issue

Users can improve the security of their smartphone device by buying a high-end phone. Around 88% of all phones worldwide are Android devices of various types. The remaining 12% are Apple’s iOS design which is widely considered to have superior security. Android phones made by Google, including the Nexus and Pixel brands have security as good as Apple’s iPhone but users who are concerned about their security are well advised to avoid generic devices such as those from Huawei and Xiaomi.

Unwitting users introduce vulnerabilities into their smartphones voluntarily and by some estimates more than half of all smartphone users had downloaded some kind of unsafe files or content to their mobile device.

 USENIX Symposium:      Portswigger:      I-HLS:      CCSInet:     Guardian:     ZDNet:     Cyware:

You Might Also Read: 

Cyber Criminals Increasingly Focus On Mobile Devices:

 

« Phishing- As-A-Service
Outsourcing IT Systems & Data Management Can Be A False Economy »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.

Dialog Enterprise

Dialog Enterprise

Dialog Enterprise is the corporate ICT solutions arm of Dialog Axiata, Sri Lanka’s leading connectivity provider.

Deimos

Deimos

Deimos is a technology, cloud, hybrid and multi-cloud focused, professional services company. Our expertise and focus is on cloud native Developer and Security Operations.