An insightful report on US Today shows how hackers can easily get control of your mobile devices.
The report quotes a security expert study from from Georgia Tech and Alcatel-Lucent which disclosed gaping security holes in the developer support services of both Apple and Google.
“What’s worse, cybercriminals who are probing novel ways to infect mobile devices with malicious code, much as they do PCs, may be the least of consumers’ worries,” Byron Acohido writes for US Today. “Application developers, online advertising networks and social media sites may pose even bigger threats.”
“These legit players in the nascent mobile app and ad space have dispersed thousands of free apps designed to capture personal location, contacts and calendar entries,” Byron Acohido said. “While in hot pursuit of mobile advertising revenue, they are sharing this sensitive information indiscriminately among themselves.”
“It’s just not malware we need to worry about; it’s also app developers requesting more personal information than they need to make the app work, and then selling that information to monetize their apps,” says Domingo Guerra, co-founder and president of mobile app security start-up Appthority.
The disclosures come as Apple, Google, Microsoft and BlackBerry hustle to entice software developers to create cool new apps for their respective mobile platforms — in a tumultuous business environment.
“Whenever a platform gets more popular and more attention, there’s a higher motivation to try to take advantage because the chances for potential economic profit are higher,” says Billy Lau, a research scientist at the Georgia Tech Information Security Center.
The security experts were able to demonstrate that even Apple’s highly secure App Store is not impervious to attacks.
According to the report, “Lau and GTISC associate director Paul Royal on Wednesday disclosed a way anyone can pose as a developer and finagle Apple’s app-approval process to install a malicious application on non jail-broken iOS devices.”
This method includes:
The experts also demonstrated how easy it is to hack an Android device.
According to the report:
Kevin McNamee, director of Alcatel-Lucent’s Kindsight Security Labs, showed how it’s possible to hack into any popular Android app that’s being distributed online and embed code that turns the smartphone of anyone who downloads the app into a spyphone.
The corrupted device transfers the phone’s location and contacts to the attacker, who can then send text messages luring others to download the tainted application, and even remotely operate the device to take photos and record conversations.
Video of the Exploit below: