0% found this document useful (0 votes)
15 views10 pages

Mobilehacking

It is one of the chapter from cyber security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views10 pages

Mobilehacking

It is one of the chapter from cyber security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Introduction of Mobile Hacking

Phone hacking is that the practice of manipulating or gaining unauthorized


accessto mobile phones, like by intercepting telephone calls or accessing voicemail
messages. When the unauthorized access is to the phone user's conversation, it's
more commonly mentioned as phone tapping.

The mobile device has become an inseparable a part of life today. The attackers
are easily ready to compromise the mobile network due to various vulnerabilities,
the bulk of the attacks are due to the untrusted apps. SMS is differently the
attackers are gaining access to the mobile devices by sending phishing
messages/spam messages to users.
Introduction of Mobile Hacking
Mobile Attack Vector
There are several sorts of threats and attacks on a mobile device. a number of most
elementary threats are malware, data loss, and attack on integrity. An attacker may plan to
launch attacks through victim's browser by a malicious website. Social engineering attacks,
data loss, data theft are the common attacks on mobile technology. Mobile attack vector
includes:

 Malware
 Data Loss
 Data Tampering
 Data Exfiltration
Mobile Platform Vulnerabilities and Risks
 Malicious Apps in Store
 Mobile Malware
 App Sandboxing vulnerabilities
 Weak Device and App Encryption
 OS and App Updates Issues
 Jailbreaking and Rooting
 Mobile Applications Vulnerabilities
 Privacy Issues (Geolocation)
 Weak Data Security
 Excessive Permissions
 Weak Communications Security
 Physical Attacks
Security Issues Arising from APP Stores
 Insufficient apps leads to malicious and fake apps entering appmarketplace
 App Store are common target for attackers to distribute malware and malicious apps
 Attackers can also social engineer users to download and run apps outside the official app
stores
 Malicious apps can damages other applications and data, and send your sensitive data to
attackers
Mobile spam

 Unsolicited text/email messages sent to mobile


devices from known/unknown phone number /
email ID’s
 Spam Messages contain advertisements or
malicious links that can trick users to reveal
confidential information
 Significant amount of bandwidth is wasted by spam
messages
 Spam attacks are done for financial gain
SMS Phishing Attack (SMiShing)
SMS Phishing is the act of trying to acquire personal and financial information by
sending SMS (Instant Messages or IM) containing deceptive link.
Android Phone Security Tools

There are many Anti-virus's applications, protection tools, vulnerability scanning


tools, Anti-theft, find my phone applications available on the Play Store. These tools
include:
 DroidSheep Guard
 TrustGo Mobile Security
 Sophos Mobile Security
 360 Security
 Avira Antivirus Security
 AVL
 X-ray
Mobile Protection Tools
Countermeasures for Mobile Security
 Avoid auto-upload of files and photos
 Perform security assessment of applications
 Turn Bluetooth off
 Don’t connect to open networks or public networks unless it is necessary
 Install applications from trusted or official stores
 Configure string passwords
 Use Mobile Device Management MDM software’s
 Use Remote Wipe Services
 Update Operating System’s
 Do not allow rooting / jailbreaking
 Encrypt your phone
 Periodic backup
 Filter emails
 Configure application certification rules
 Configure mobile device policies
 Configure auto-Lock

You might also like