4 min read

The Top Five Security Risks Smartphone Users Face Today

Filip TRUȚĂ

July 02, 2021

The Top Five Security Risks Smartphone Users Face Today

In a recent blog entry on Hot For Security, we discussed how mobile devices today face a plethora of security threats that don’t discriminate between hardware and operating system. We explained why iPhones are not immune to cyber threats, as some Apple fans like to believe, and we showed how Android apps sold outside the Google Play Store are more dangerous than we often think. Now that we know mobile security threats are no myth, let’s look at the top five threats most commonly faced by mobile users today.

Stalkerware

Stalkerware, part of the spyware family, is monitoring software typically used for stalking. The term “stalkerware” was coined when bad actors started to use commercial spyware to stalk their spouses. It is used by domestic abusers and, sometimes, even employers.

Stalkerware is used to track your whereabouts, record your instant messaging chats, and even turn on the camera or mic to spy on you. The threat actor typically needs physical access to your device. However, stalkerware can also infect your phone if you unwittingly download and install a software package containing the malicious code.

That’s why it’s important to use a security solution that can detect malicious activity on your phone, and of course to only download and install apps from your vendor’s vetted app store.

Phishing / Smishing / Vishing

Phishing is a social engineering tactic that works regardless of platform. Typically deployed via spam email, phishing campaigns use a plethora of convincing messages to trick the user into divulging their user name, password or credit card information. The tactic has been modeled to also use SMS as a harboring medium, earning the name ‘smishing’ (SMS + phishing). These attacks usually insist that you either call an overcharged number, access a malicious URL, or that you reply with your personal or financial information to earn a prize. Some use scare tactics and try to trick users into thinking their personal data has been compromised, urging them to take immediate steps to reduce the damage.

There’s even a voice-based type of phishing attack called, unsurprisingly, ‘vishing’ (phishing + voice). The intentions are usually the same as the ones described above, only this time it’s an actual person (or robot) trying to scam you on the phone. They may try to steal your identity and financial information like your PIN and card details.

Regardless of how they’re conveyed, phishing attacks always try to induce a sense of urgency or fear. Never reply to unsolicited messages claiming to come from your bank or various vendors, and always check beforehand whether the message indeed comes from a legitimate or fake source. However, it’s important to note that phishing scams are continually evolving, making it difficult even for the trained eye to spot them sometimes. Modern mobile security solutions are a wise choice because they can sniff out phishing attacks that the user may not notice.

Public Wi-Fi

Using a phone to pay at the cash register has become common, and some might think the same goes for shopping online using a phone when out and about. However, public Wi-Fi networks are not always safe.

Some threat actors set up Wi-Fi networks specifically to steal your access credentials or credit card information.

A lack of an HTTPS prefix at an online store is another big red flag. Data you exchange with unsecured HTTP websites is not encrypted, letting threat actors intercept your communications in what is referred to as a ‘man-in-the-middle’ attack.

Using a security solution on your device can vastly reduce your chances of falling into this net – especially if that solution comes pre-loaded with a handy VPN, which encrypts your digital activity and hides your identity from prying eyes. Of course, the responsibility is first and foremost yours to be vigilant and use only trusted websites and networks. In other words, it’s best to keep it simple when using public Wi-Fi and to only shop online from the confines of your home network. As a general rule, refrain from using public Wi-Fi to beam out sensitive data or financial information.

Rogue Apps

Bitdefender’s 2020 Consumer Threat Landscape Report shows how the surge in popularity of video conferencing solutions during the pandemic opened a door for opportunistic threat actors. Troves of users installed Zoom from unofficial app stores, exposing themselves to malware disguised as Zoom installers.

In a more recent finding, Bitdefender researchers noted that the practice of sideloading – installing APK binaries from repositories other than the official Google Play Store – is still strong among Android users.

“Using a combination of tricks to persuade users to install apps outside of the official store, criminals spread most of their malware through sideloading. If mobile devices have no security solution installed, malicious apps roam free,” our researchers wrote in a recent Bitdefender Labs entry.

Threat actors are leveraging sideloading to deploy Teabot, also known as ‘Anatsa,’ a piece of Android malware that can carry out overlay attacks via the Accessibility Services. Teabot can intercept messages, perform keylogging activities, steal Google Authentication codes, and even let its authors take full remote control of a user’s phone. Teabot is hidden in fake apps copying popular counterparts from the official Google Play store, including ad blockers and antivirus apps.

Poor passcode hygiene

Of all the personal devices, our phones carry by far the most sensitive information about us. Using an easy-to-guess passcode like 0000 or 1234 is practically begging to be compromised. The same goes for the password your phone knows to authorize access with (your Apple ID, Google account, etc.). If you use the same password everywhere, chances are that password will be exposed in a data breach sooner or later. Using data scraping and password spraying, malicious actors can put together your digital identity and compromise the account associated with your phone. They not only have access to your personal and financial data, they can even lock you out of your device.

Bitdefender Digital Identity Protection enables you to check your online accounts against data breaches, find your private information online in legal and illegal collections of data, detect your social media impersonators and more.

Mobile Security to the rescue

If you’ve ever found yourself asking “what are the security risks associated with my phone?” you are on the right track to defend yourself against cyber threats.

Bitdefender Mobile Security is available for iPhone or Android users and offers full protection against mobile-specific threats, plus a secure VPN for a fast, anonymous and safe experience while surfing the web. Bitdefender Mobile Security helps users secure their passwords, private data and financial information, and instantly alerts you whenever an incident is detected and prevented.

Stay safe!

tags


Author



Right now

Top posts

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

July 29, 2021

5 min read
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

8 Steps to Protect Your Account and Data When Using Discord 8 Steps to Protect Your Account and Data When Using Discord
Alina BÎZGĂ

July 20, 2021

2 min read
10 Tips to Avoid the Most Common Scams On Popular Online Gaming Platforms 10 Tips to Avoid the Most Common Scams On Popular Online Gaming Platforms
Alina BÎZGĂ

July 19, 2021

2 min read
Five Easy Tips to Strengthen the Security of Your Apple Account Five Easy Tips to Strengthen the Security of Your Apple Account
Filip TRUȚĂ

July 16, 2021

6 min read