7 Alarming Ways Hackers Can Screw with Your Smartphone

Joel Lee 27-11-2015

For a lot of us, “compromised smartphone security” is basically synonymous with “time to run another malware scan”, and as such, we view security threats more as inconveniences rather than the dangers they really are.


Maybe the problem is that we aren’t fully aware of what hackers can really do with our smartphones. It’s one thing to learn about common smartphone security risks 4 Smartphone Security Risks To Be Aware Of There seems to be a sort of general malaise among users – the tech savvy and everyday users alike – that because your computer fits in your pocket, it can’t be infected by malware, Trojans,... Read More , but if that knowledge stays abstract, it does you no good.

So to get you thinking the right way, here are some real examples in which your smartphone can be hacked and used against you, and I promise you’ll start thinking of smartphone security as an everyday necessity rather than just for the paranoid.

1. Remotely Control Your Device

Not long ago, a researcher discovered a zero-day exploit in the (at the time) latest version of Chrome for Android — an exploit that granted the hacker full access to the smartphone’s root operating system and worked on every version of Android.


It has already been reported to Google (and yes, the researcher picked up a large security bounty payout Google Will Pay You $100+ If You Just Help Them Out Google has paid out hundreds of thousands of dollars to regular users for doing one simple thing. Read More for it) so it should be patched soon enough, but this just goes to show how much control a hacker can get. Full root access!


What’s most interesting is that this particular exploit didn’t come from a app-related malware infection Has Your Android Phone Been Infected with Malware? How does malware get on an Android device? After all, most users only install apps through the Play Store, and Google keeps a tight watch over that to make sure malware doesn't squeeze through, right?... Read More . It was simply an overlooked vulnerability in the JavaScript V8 engine that Chrome uses. So no matter what you think you know about smartphone security What You Really Need To Know About Smartphone Security Read More , surprises are always waiting around the corner.

2. Remotely Eavesdrop on Calls

Around the same time that the above-mentioned Chrome exploit was publicized, another vulnerability came to light — but this particular issue only affected Samsung Galaxy S6, S6 Edge, and Note 4 devices. Still, lots of people use those phones, so millions were affected.


Long story short, by using a man-in-the-middle attack What Is a Man-in-the-Middle Attack? Security Jargon Explained If you've heard of "man-in-the-middle" attacks but aren't quite sure what that means, this is the article for you. Read More , hackers were able to connect the device to fake cellular base stations and thus intercept incoming and outgoing voice calls. After intercepting, hackers could potentially listen to, and even record, said calls.


The setup of the exploit is a bit too complicated for any regular hacker working on his own to set up, but the scary thing is that there’d be no way for the end user to know that something is amiss.

3. Spy on Your Every Move

Back in 2011 when the iPhone 4 was the phone to own, a computer scientist from Georgia Tech experimented with the built-in accelerometer and found that he could read computer keystrokes from nothing more than desk vibrations. In fact, his accuracy was just over 80 percent.

This particular issue is easily circumvented — all you have to do is keep your phone off your computer desk — but it goes to show how clever and innovative hackers can be.



Another example is PlaceRaider, which was a military app that secretly took snapshots of your surrounding (using the smartphone’s camera) and could use those images to rebuild your environment in virtual 3D.

How could this be abused? Imagine if a hacker managed to upload this kind of malware onto your phone, used it to replicate your home, and used that as a way to spot valuable objects worth stealing? But of course the real creepy factor here is the invasion of privacy.

4. Break Into Your Home

Speaking of home robberies, there are more angles to consider when thinking about the safety of your home in relation to your smartphone — especially if you’re invested in smart home products 5 Security Concerns to Consider When Creating Your Smart Home Many people attempt to connect as many aspects of their lives to the web as possible, but many people have expressed genuine concerns over how secure these automated living spaces actually are. Read More or the Internet of Things at home 7 Reasons Why The Internet of Things Should Scare You The potential benefits of the Internet of Things grow bright, while the dangers are cast into the quiet shadows. It's time to draw attention to these dangers with seven terrifying promises of the IoT. Read More .

To be fair, smart home automation isn’t inherently insecure. With the right precautions, you can have a smart home that’s properly protected and impervious to most common threats. Don’t let the potential for hacking deter you from exploring the possibilities of a smart home.



But that being said, just as any Internet-connected device can be compromised, so too can smart home products — and your smartphone is the weakest link.

For example, if you have a smart home security system Safe and Sound: 4 Great Smart Home Security Devices Read More that’s controlled by your smartphone, imagine what could happen if a hacker gained remote control access to your device. They might be able to unlock doors, disable cameras, or worse.

5. Extort You For Money

In 2013, a new kind of malware hit the Web. Essentially, this malicious scam would lock down your computer and force you to pay a fee to regain control of your system. It’s called ransomware and is one of the worst kinds of malware out there Malware on Android: The 5 Types You Really Need to Know About Malware can affect mobile as well as desktop devices. But don't be afraid: a bit of knowledge and the right precautions can protect you from threats like ransomware and sextortion scams. Read More .


In 2014, ransomware hit Android in the form of an FBI warning that accused you of breaking the law FBI Ransomware Hits Android: How to Avoid Getting It (And Remove It) Learn how to keep your Android device safe from FBI Ransomware with these tips. Read More (such as claiming you had child pornography on your device) and demanded a fine to avoid jail. As you might expect, plenty of people paid the fine out of sheer surprise and fear.

Removing ransomware is possible but also a pain. The key is to be wary of what ransomware looks like so you can identify it and keep yourself protected from it Ransomware Keeps Growing - How Can You Protect Yourself? Read More .

6. Steal Your Identity

2014 was a bad year for customer data security. Companies like Target, AT&T, and eBay all suffered data breaches 3 Online Fraud Prevention Tips You Need To Know In 2014 Read More , resulting in a lot of stolen identities. And though it would be nice to say that these incidents are ramping down, that would just be a bold-faced lie.


The truth is, smartphones can lead to identity theft in a lot of ways these days, and one of the bigger risks lies in NFC technology Using NFC? 3 Security Risks To Be Aware Of NFC, which stands for near-field communication, is the next evolution and is already a core feature in some of the newer smartphone models like the Nexus 4 and Samsung Galaxy S4. But as with all... Read More (also called “bumping”). Essentially, hackers can bump your device without you realizing it, and by doing so, they can intercept sensitive data.

Worried that your identity might’ve been stolen? Stay up to date with these warning signs of digital identity theft 6 Warning Signs Of Digital Identity Theft You Shouldn't Ignore Identity theft isn't too rare of an occurrence these days, yet we often fall into the trap of thinking that it'll always happen to "someone else". Don't ignore the warning signs. Read More and respond accordingly if you notice anything off or suspicious.

7. Use Your Device to Attack Others

Sometimes hackers don’t really want the data on your device — instead, they just want to use your device as a minion for their own nefarious purposes. With the right malware installed, your smartphone could turn into a zombie Is Your PC A Zombie? And What's a Zombie Computer, Anyway? [MakeUseOf Explains] Have you ever wondered where all of the Internet spam comes from? You probably receive hundreds of spam-filtered junk emails every day. Does that mean there are hundreds and thousands of people out there, sitting... Read More .


In 2012, the NotCompatible Trojan for Android turned all infected devices into one massive botnet, making it easy for hackers to use those devices in sending out all kinds of spam. But in 2014, it evolved and became a little scarier with the potential to launch targeted attacks and bring down networks.

This kind of attack is called a distributed denial-of-service attack What Is a DDoS Attack? [MakeUseOf Explains] The term DDoS whistles past whenever cyber-activism rears up its head en-masse. These kind of attacks make international headlines because of multiple reasons. The issues that jumpstart those DDoS attacks are often controversial or highly... Read More and botnets are famous for it. Your smartphone could be a zombie and you might not even realize it.

Smartphone Security Threats Are Real

Obviously, these exploits and vulnerabilities are way more than simple inconveniences. If something like these happens to you, it can be quite serious. That’s why it’s so important to stay vigilant and learn how to protect yourself.

At the very least, you should change your bad security habits Change Your Bad Habits & Your Data Will Be More Secure Read More right away — nothing will improve your safety more than that — but you should also internalize these common smartphone security mistakes Ten Common Smartphone Mistakes That Expose You To Security Risks The following is a run-down of ten of the most common smartphone mistakes. Read More .

Have you ever had to deal with a seriously compromised device? What happened? What advice would you give to others? Share with us in the comments below!

Image Credits: Hacker with question mark by designelements via Shutterstock, Chrome Mobile App by Alexander Supertramp via Shutterstock, Samsung Galaxy S6 by Zeynep Demir via Shutterstock, iPhone on Desk by Daria Minaeva via Shutterstock, Smart Home Phone by Alexander Kirch via Shutterstock, Locked Smartphone by wk1003mike via Shutterstock, Smartphone NFC by LDprod via Shutterstock, Global Network by Milles Studio via Shutterstock

Related topics: JavaScript, Smartphone Security, Trojan Horse.

Affiliate Disclosure: By buying the products we recommend, you help keep the site alive. Read more.

Whatsapp Pinterest

Leave a Reply

Your email address will not be published. Required fields are marked *