The recent wave of smartphone attacks is raising concerns around the world. Affected users blame the fact that the smartphone unlocks itself, which is one of the main symptoms that our smartphone may have been hacked.
When you search for the phrase “auto unlock phone” over 209 million results come up on Google and it’s not an error or insect. In fact, experts believe this may have been caused by an attack GhostTouch.
the pirate Screen or GhostTouch is the new wave of attacks
GhostTouch is the latest screen hacking attack that allows criminals to access mobile phones remotely. In simple terms, hackers use electromagnetic signals to simulate elementary actions such as clicks and swipes on strategic areas of a touchscreen.
Again, the goal is to remotely access and manipulate smartphones in potentially dangerous ways (access to data or passwords, access to insecure services, or install malware). The ultimate goal is always easy profit.
This is how the attack works the pirate number of screens
according to detectives From Zhejiang University (China) and Technical University of Darmstadt (Germany), screen hacking attacks use “electromagnetic interference (EMI) to inject false touch points into the screen.” touches. This without having to touch it.
These types of attacks operate from 40mm away, and take advantage of touchscreens’ sensitivity to electromagnetic interference. In fact, criminals can inject electromagnetic signals into the electrodes that are part of touch screens and record them as touch actions (short presses, swaps, presses, or long presses).
The attack has been proven to work on nine smartphone models, including the iPhone SE (2020), Samsung Galaxy S20 FE 5G, Redmi 8, and Nokia 7.2.
These are the signs of a “hacked” smartphone.
If the user’s screen is hacked, it will start working on its own. For example: opens automatically Or answer calls without being asked by the user.
Another sign of a hacked cell phone is that it starts opening random URLs. Or even logging into a user’s bank accounts, opening files, and playing videos. Or even typing words into the search box without the user’s consent.
Criminals can also try to create malicious connections to launch attacks man in the middle Or manipulate the phone with a Bluetooth mouse.
So, if you notice any unusual Bluetooth or Wi-Fi connections, it is likely that your phone has been hacked.
3 ways to protect yourself from screen hacking attacks
- Add an extra layer of security. In addition to strong passwords, enable advanced security measures such as facial recognition, fingerprints, or PINs for high-risk actions (such as money transfers). This will help prevent financial loss even if you fall victim to a screen hacking attack.
- Keep your phone’s operating system up to date. Updates provide essential security features that can reduce the risk of attack. These vulnerabilities are minimized and may also contain additional features specifically designed to protect the mobile phone from this type of attack.
- Use anti-malware software. Using anti-malware software does not stop screen hacking attacks, but it does make criminals unable to install malware on a device if they gain control of it.
The 4gnews editors recommend:
“Friendly zombie fanatic. Analyst. Coffee buff. Professional music specialist. Communicator.”