Skip to main content
Advertisement
Live broadcast

The expert spoke about the signs of unauthorized access to the smartphone

Analyst Novikov: the phone can be tapped if it runs out of battery quickly
0
Озвучить текст
Select important
On
Off

One of the main signs of a smartphone compromise is its atypical behavior without user involvement. Nikita Novikov, head of the Analysis, Monitoring and Response Department at Angara Security, told the Prime news agency on May 22.

"If the smartphone starts to overheat in standby mode, discharge quickly, or there is an increase in background traffic, this may indicate the launch of malicious processes, including those related to data transfer to external servers," the expert explained.

You can check for active forwarding using several USSD commands. So, to display the status, you can dial *#21#, and to reset all redirects, dial ##002#. These commands work on most mobile networks.

Novikov also advised checking the details of calls and Internet activity in the operator's personal account, since regular Internet connections at night or with the screen locked may be a signal of hidden activity characteristic of spyware. Using antivirus programs is useful for detecting threats, especially if you are using a product with up-to-date signatures and behavioral analysis.

The specialist noted that it is also important to manually check the list of installed applications, as this way you can find programs without icons that are not associated with the official app store or have extended rights such as access to a microphone, camera, geolocation, and service data. All this is a reason for a deeper analysis. It is also worth considering that malware may not be displayed in the user interface and may work as a system service.

Special attention, according to Novikov, should be paid to the uncontrolled behavior of the device.: its spontaneous activation, microphone activation, or background application launch. This may indicate the presence of hidden malware, in which case it is worth using specialized antispyware scanners. However, the most reliable way remains a full factory reset followed by a change of all credentials.

The expert gave advice, observing which you can minimize the risks. To do this, you need to install software only from official sources, prohibit the installation of applications from unknown sources (including APK files), and do not connect to unencrypted public Wi-Fi networks, Novikov shared.

"Basic digital hygiene is the foundation of security, especially in the face of an increasing number of spyware and an increase in targeted attacks on users," the expert concluded.

Neuropsychologist Irina Khvingia revealed on May 21 that scammers target people with a mobile psyche, most often teenagers and the elderly, because it is easier to scare, convince and encourage them to act. Nowadays, attackers often use neuro-linguistic programming (NLP) techniques, taking into account the psychophysiological state of the potential victim. Hwingia explained that scammers choose tired, distracted and poorly concentrated people.

Переведено сервисом «Яндекс Переводчик»

Live broadcast