Smartphones Are More Vulnerable Than You Think

Today, most people from 10 to 85 have a smartphone, although most of these users are unaware just how vulnerable to attacks these devices are.

In most cases, attacks on smartphones require physical access to the device and interactions with the touchscreen, but according to new academic research, it is possible to reach users' mobile touchscreen without touching it using electro-magnetic interference.

Modern Android smartphones are susceptible to a new type of attack named "GhostTouch" by researchers at China's Zhejiang University and the Technical University of Darmstadt that can induce fake finger taps to take unwanted actions that can execute taps and swipes on the phone’s screen, even from a distance of up to 40 mm. 

The attack exploits flaws at both the software and hardware level and has been proven to work even against the most recent smartphone models. 

GhostTouch uses electromagnetic interference (EMI) to inject fake touch points into a touchscreen without the need to physically touch it. By tuning the parameters of the electromagnetic signal and adjusting the antenna, we can inject two types of basic touch events, taps and swipes, into targeted locations of the touchscreen and control them to manipulate the underlying device.

According to the researchers’ findings, an attacker can use GhostTouch to carry out several types of malicious actions, including initiating calls and downloading malware.

Most of the touchscreens used today by smartphone and tablet companies are sensitive and vulnerable to the environmental impact of EMI. Previous studies have shown that EMI can disrupt the user experience of touchscreens and possibly cause random and harmful behavior. In one case, a phone that was placed on a charger booked a highly expensive hotel room because of EMI signals.

Researchers created the GhostTouch software in order to see if they could use EMI to create controllable touch events and trigger arbitrary behavior on touchscreens.

The core idea behind GhostTouch is to interfere with the capacitance measurement of touchscreens using electromagnetic signals injected into the receiving electrodes integrated into the touchscreen. GhostTouch is a targeted attack. The adversary must know the model and make use of the victim’s phone in order to tune the equipment. The attacker might also need extra information about the phone, such as the passcode, which they must acquire through social engineering or ‘shoulder surfing’.

These types of attacks usually occur in public locations such as cafes, open offices, libraries, etc. Places where people are not necessarily careful of how they place their smart devices. By embedding appropriate equipment under a specific table, the hacker will be able to launch attacks remotely.

The researchers tested GhostTouch on 11 widely used phone models and were able to implement the attack with varying degrees of success on nine models, demonstrating that EMI attacks are a real threat to today’s personal devices.

Mobile Phone Quality Is An Issue

Users can improve the security of their smartphone device by buying a high-end phone. Around 88% of all phones worldwide are Android devices of various types. The remaining 12% are Apple’s iOS design which is widely considered to have superior security. Android phones made by Google, including the Nexus and Pixel brands have security as good as Apple’s iPhone but users who are concerned about their security are well advised to avoid generic devices such as those from Huawei and Xiaomi.

Unwitting users introduce vulnerabilities into their smartphones voluntarily and by some estimates more than half of all smartphone users had downloaded some kind of unsafe files or content to their mobile device.

 USENIX Symposium:      Portswigger:      I-HLS:      CCSInet:     Guardian:     ZDNet:     Cyware:

You Might Also Read: 

Cyber Criminals Increasingly Focus On Mobile Devices:

 

« Phishing- As-A-Service
Outsourcing IT Systems & Data Management Can Be A False Economy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

GreyNoise Intelligence

GreyNoise Intelligence

GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

MicroSec

MicroSec

MicroSec is a company specializing in IoT security. We focus on bringing enterprise grade security to IoT and embedded systems.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Netpoleon Group

Netpoleon Group

Netpoleon is a leading provider of integrated security, networking solutions and value added services.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

Binalyze

Binalyze

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software helps you to collaborate and complete incident response investigations quickly.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

Meta 1st

Meta 1st

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer.

PrimeSSL

PrimeSSL

PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions.