Smartphones Are More Vulnerable Than You Think

Today, most people from 10 to 85 have a smartphone, although most of these users are unaware just how vulnerable to attacks these devices are.

In most cases, attacks on smartphones require physical access to the device and interactions with the touchscreen, but according to new academic research, it is possible to reach users' mobile touchscreen without touching it using electro-magnetic interference.

Modern Android smartphones are susceptible to a new type of attack named "GhostTouch" by researchers at China's Zhejiang University and the Technical University of Darmstadt that can induce fake finger taps to take unwanted actions that can execute taps and swipes on the phone’s screen, even from a distance of up to 40 mm. 

The attack exploits flaws at both the software and hardware level and has been proven to work even against the most recent smartphone models. 

GhostTouch uses electromagnetic interference (EMI) to inject fake touch points into a touchscreen without the need to physically touch it. By tuning the parameters of the electromagnetic signal and adjusting the antenna, we can inject two types of basic touch events, taps and swipes, into targeted locations of the touchscreen and control them to manipulate the underlying device.

According to the researchers’ findings, an attacker can use GhostTouch to carry out several types of malicious actions, including initiating calls and downloading malware.

Most of the touchscreens used today by smartphone and tablet companies are sensitive and vulnerable to the environmental impact of EMI. Previous studies have shown that EMI can disrupt the user experience of touchscreens and possibly cause random and harmful behavior. In one case, a phone that was placed on a charger booked a highly expensive hotel room because of EMI signals.

Researchers created the GhostTouch software in order to see if they could use EMI to create controllable touch events and trigger arbitrary behavior on touchscreens.

The core idea behind GhostTouch is to interfere with the capacitance measurement of touchscreens using electromagnetic signals injected into the receiving electrodes integrated into the touchscreen. GhostTouch is a targeted attack. The adversary must know the model and make use of the victim’s phone in order to tune the equipment. The attacker might also need extra information about the phone, such as the passcode, which they must acquire through social engineering or ‘shoulder surfing’.

These types of attacks usually occur in public locations such as cafes, open offices, libraries, etc. Places where people are not necessarily careful of how they place their smart devices. By embedding appropriate equipment under a specific table, the hacker will be able to launch attacks remotely.

The researchers tested GhostTouch on 11 widely used phone models and were able to implement the attack with varying degrees of success on nine models, demonstrating that EMI attacks are a real threat to today’s personal devices.

Mobile Phone Quality Is An Issue

Users can improve the security of their smartphone device by buying a high-end phone. Around 88% of all phones worldwide are Android devices of various types. The remaining 12% are Apple’s iOS design which is widely considered to have superior security. Android phones made by Google, including the Nexus and Pixel brands have security as good as Apple’s iPhone but users who are concerned about their security are well advised to avoid generic devices such as those from Huawei and Xiaomi.

Unwitting users introduce vulnerabilities into their smartphones voluntarily and by some estimates more than half of all smartphone users had downloaded some kind of unsafe files or content to their mobile device.

 USENIX Symposium:      Portswigger:      I-HLS:      CCSInet:     Guardian:     ZDNet:     Cyware:

You Might Also Read: 

Cyber Criminals Increasingly Focus On Mobile Devices:

 

« Phishing- As-A-Service
Outsourcing IT Systems & Data Management Can Be A False Economy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Metmox

Metmox

Metmox mission is to be trusted advisor and partner to protect our customer’s evolving Cloud, Network, Application, IT infrastructure and cybersecurity needs.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.