Click a 'bad' link and a hacker gets full control of your phone

This version of Click Bad Link Hacker Gets Full Control Your Phone Flna320247 - Technology and Innovation | NBC News Clone was adapted by NBC News Clone to help readers digest key facts more efficiently.

If you click a single "bad" link, a hacker could gain full control of your mobile device — without you ever knowing anything is wrong. Sounds impossible? It's not. Sounds scary? It is. 

But don't panic just yet.

As Technology Review's Tom Simonite explains, the method used to gain full remote control of a mobile device was demonstrated during the RSA security conference recently. Members of a security startup called CrowdStrike showed that as long as they could trick someone into following a link from his mobile device, they would be left with the ability to record his phone calls, intercept his text messages and more.

The security attack relies on exploits in WebKit, a browser component which is at the core of many mobile Web browsers — including those on Android, iOS and BlackBerry devices. The method used is very targeted and it isn't particularly likely you'll find yourself a victim of it.

But it's pretty darn devastating to understand just how vulnerable you are. To illustrate that point, CrowdStrike's George Kurtz and his colleagues used an unmodified Android device to show how an attack might play out:

Kurtz, playing the role of a busy investor at an industry event, received a text message claiming to be from his mobile carrier asking him to download an update to his phone's software. When he clicked the link in that message, the phone's browser crashed and the device rebooted. Once restarted, the device appeared unchanged, but a silent, malicious app had been installed that relayed all his phone calls and text messages to the attacker, who could also track his location on a map.

The "silent, malicious app" installed on Kurtz's device is actually a hard-to-detect "rootkit" — software which is invisible to a lot of security tools, according to Simonite. 

The way to prevent individuals from being victims to it — or similar attacks — involves frequent updates of mobile operating systems, in order to patch security exploits before someone with malcious intent can take advantage of them. Unfortunately, that's not always an option, as Simonite explains:

[D]oing that is far from easy, because wireless carriers, device manufacturers, and mobile operating system providers must all be involved. As a consequence, most mobile devices today receive updates very rarely.

Want more tech news, silly puns, or amusing links? You'll get plenty of all three if you keep up with Rosa Golijan, the writer of this post, by following her on Twitter, subscribing to her Facebook posts, or circling her on Google+.



×
AdBlock Detected!
Please disable it to support our content.

Related Articles

Donald Trump Presidency Updates - Politics and Government | NBC News Clone | Inflation Rates 2025 Analysis - Business and Economy | NBC News Clone | Latest Vaccine Developments - Health and Medicine | NBC News Clone | Ukraine Russia Conflict Updates - World News | NBC News Clone | Openai Chatgpt News - Technology and Innovation | NBC News Clone | 2024 Paris Games Highlights - Sports and Recreation | NBC News Clone | Extreme Weather Events - Weather and Climate | NBC News Clone | Hollywood Updates - Entertainment and Celebrity | NBC News Clone | Government Transparency - Investigations and Analysis | NBC News Clone | Community Stories - Local News and Communities | NBC News Clone