Connect with us

Hi, what are you looking for?

HEADLINES

How can you know if your smartphone has been compromised?

As the information stored on our phones becomes increasingly sensitive, the risk of losing it becomes more real, and the consequences of such a loss much more significant.

By Parvinder Walia, Sales and Marketing Director at ESET, Asia Pacific

Slowly smartphone users in Asia-Pacific are beginning to understand how important it is to protect their devices from malware. As the information stored on our phones becomes increasingly sensitive, the risk of losing it becomes more real, and the consequences of such a loss much more significant.

However, users in Asia-Pacific are still not cyber-savvy enough. While a large proportion of consumers are concerned about malware and cyber threats, they don’t know or do enough to protect themselves online.

The first step to protecting devices is to know what measures to take identify malicious actvitiy. What makes this complicated is that attackers involved in a mobile scam will often take measures to prevent the threat or malware from being noticed by the user.

Advertisement. Scroll to continue reading.

Delaying the malicious action, using only Wi-Fi networks, or reducing the level of activity when the user is operating the device are some of the strategies used by the malware to conceal itself. Nonetheless, eventually the malicious activity will have to kick into action, and that’s when you can pay attention to certain signs to detect illegitimate activity. Here are some of the signs that may indicate that your phone has been compromised:

#1: You notice the system or certain apps behaving strangely

One possible clue to diagnosing malware on your device is the sudden failure of apps that usually work fine. If you haven’t updated the system or the app in question recently, and then unexpectedly that app suddenly starts closing or displaying various error messages, it may be that some malicious code on your device is interfering with its normal running processes.

The malware may try to take advantage of vulnerabilities present in the system’s apps, using them to access permissions that have been granted to them, or to violate the platform and run commands with administrator permissions. Such attempts to exploit the weaknesses of other apps may result in errors that can be noticed by the user.

Being aware of what apps are installed on your phone will make it easier to identify any app that you didn’t authorize. Bear in mind that many malicious apps disguise themselves as system components, so an app may be something other than what it appears to be. If the app has requested administrator permissions, you may not be able to uninstall it through the system settings. For this reason, it’s important to be extremely careful with what permissions you grant to apps when they are installing—or running.

Advertisement. Scroll to continue reading.

#2: Your call or message history includes some unknown entries

Regularly checking your call history for unknown numbers is an excellent habit to adopt. Lots of malware families try to make calls or send messages to premium international numbers. Such malware ends up having a direct impact on the user, who unjustly has to pay the costs.

This type of malware has been growing significantly and about 50 new examples are detected each month. Our products identify this type of malware under the Android/TrojanSMS family. If we analyze the number of new variants of this family that have been created since the start of this year, we can see the extent of this family’s growth. Unfortunately, our research suggests that this trend shows no sign of decreasing in the near future.

#3: Excessive data usage

Malicious apps may be using the data system to communicate with command and control centers operated by cybercriminals in order to download orders and updates, as well as send back information stolen from the device.

Advertisement. Scroll to continue reading.

If you usually check how much data your apps use, you will quickly become aware of any changes to the normal pattern. While checking data usage of an app be sure to also check the times when the sending and receipt of data is highest and compare this with your use of the device. If there is an excessive amount of data exchange taking place at times when you don’t use the device, you have grounds for suspecting that something strange is going on.

#4: You or your contacts receive strange text messages

One method used a lot by cybercriminals to control infected mobile devices is sending text messages containing commands to be interpreted by the malware, which then takes the corresponding action. Lots of examples of malware manipulate message logs to delete any such messages that could raise the user’s suspicions, but others don’t bother with such precautionary measures, in which case the user can read the content that is received and sent.

Mobile malware can also send text messages to phone numbers from the user’s list of contacts as a way to propagate itself, using this method to get the recipients to download malicious content via specific links. If your friends receive strange messages from your phone, you should check what apps are installed on it.

#5: Your payment breakdown includes actions you did not make

Advertisement. Scroll to continue reading.

Sending text messages, making calls, and using the data system will result in increased costs, which the user will be responsible for. Examining the costs attributed to your mobile phone number on a monthly basis is a good practice to be able to detect any malicious activity quickly.

You also need to take into account the fact that a lot of malware tries to pass through official app stores to steal your credit card data. For this reason, if you regularly make such payments through your mobile device—or any other platform—you should also check the transactions through such services to ensure there are no unwarranted charges.

What steps should you take if your phone has been compromised or infected?

If for any of the reasons mentioned above you believe you may have been infected by malware, you can install a trustworthy security solution to scan your device in order to identify the threat. You can also contact the official customer services provided by the seller so they can look into the problem.

If you have the technical know-how, you can try to remove the threat yourself through a command console.

Advertisement. Scroll to continue reading.

Furthermore, if you suspect that sensitive information stored on your device may have been stolen, you can change your credentials for accessing any services you have used on your device.

However, remember that prevention is always better than cure.

To avoid any unpleasant experiences when using your device, you should take a proactive and preventive approach to keep the data on your mobile device secure:

Always keep your device’s operating system and apps updated with the latest available versions.

Make a backup copy of all data on the device, or at least the most important data.

Advertisement. Scroll to continue reading.

Use security solutions provided by a highly reputable company and keep them up to date.

Be sure to use only official stores for downloading apps, where the likelihood of becoming infected by malware is lower—although still not zero.

Use a screen lock, and remember that the pattern may be easy to guess and less secure than a PIN, and that a password is your best option.

Encrypt the content on your device.

Try to avoid running rooting or jailbreaking processes on the device.

Advertisement. Scroll to continue reading.

By following these simple tips listed above, you can confidently make full use of the internet and available technology safely and with no stress.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The cybersecurity landscape is fast changing, and businesses across all industries as well as consumers are facing evolving threats to their data and privacy....

HEADLINES

This new brand proposition will be supported with a fully integrated campaign which will be executed throughout 2022.

HEADLINES

Pondering on the significant events and trends that shaped the financial threats’ sector in 2021, Kaspersky researchers have forecasted several important tendencies expected to...

HEADLINES

As organizations worldwide slow down for the holidays as well as find themselves in work environment transitions - with many returning to pre-pandemic in-office...

HEADLINES

Deep learning models have reached the point where they can train themselves to enable security systems to predict threats before they happen.

SOFTWARE

MicroWorld's latest offering aims to reinvent cybersecurity in the face of an ever-evolving threat landscape, especially in light of the ongoing pandemic. The cyber...

HEADLINES

When you compare the immense financial losses that a breached company suffers with the much smaller-scale financial transactions taking place on these criminal forums,...

HEADLINES

The vast majority (70%) of all IT teams said the number of phishing emails hitting their employees increased during 2020. This rose to 82%...

Advertisement