Last weekend, a world consortium of media organizations published an investigation around a leaked list of 50,000 phone numbers from across the planet, called the Pegasus Project.
We researched about the leaked list or information that comprises surveillance targets for authoritarian governments around the world using the Pegasus spyware (developed by Israel’s NSO Group), to Monitor and keep surveillance into the smartphones of Active Ground People that involve journalists, activists, politicians, and business executives.
However, spyware like Pegasus is not the only way someone’s personal device is often hacked into. There are various and easy to complex tools and techniques to hack into a user’s smartphone just through one small malicious link which led to hijacking public Wi-Fi, and devices accordingly.
Hack level: Easy
Fake apps
The most commonly used hacking tool is a fake app. Google Play Store and Apple App Store regularly take down many apps which will be fake or malicious.
Hackers usually do the social engineering process, they create fake apps imitating a well-liked app, and embed it with spyware or other malware. These apps are mostly found on third-party app stores, on social media, available on the internet, like pop-up ads, or sometimes, hackers target users via messages and links on websites.
Malicious links
Malicious links are another popular means of hacking a smartphone, and may sometimes even be a precursor to leading a user to fake apps.
The devices are being compromised through these malicious links or attachments usually sent through e-mails, SMS, or third-party chatting apps. All these needs is a click/tap on the link from a user. Once you click any suspicious link, the link injects a user’s device with virus/malware, giving the hacker control over (a part or entire) data on the device.
Phishing
Phishing may be a method employed by hackers where they impersonate a corporation or trusted individual so as to realize confidential data.
Here, hackers often use official-looking communication, commonly shared via email or text messages, usually resulting in a login page for a service that looks legitimate, but is actually faked. When you follow phishing links to a login page and enter your details — for instance to your checking account — your personal information has basically been stolen. This applies to banks, social media accounts, or any service that needs a login and password.
Bluetooth File Transfers:
It’s likely that you might have experienced this at least once before: a random Bluetooth file transfer from an unknown person. This is known as viral malware from another infected phone, which is trying to dump its payload into your device. Never accept unknown or unsolicited Bluetooth file transfers.
Hack Level: Moderate
Hacking Devices through Public WiFi:
Any type of network, which includes public WiFi, can be snooped upon. Unencrypted traffic can be easily stolen. Your Facebook login, emails? Your bank details? All are open source – free games for a motivated hacker.
It’s simple and is necessary that we should always avoid public Wi-Fi. And if you create financial transactions from your smartphone, then it is best to offer it a miss. Also, close up your Wi-Fi when not in use.
Using Various devices such as smartphones/tablets/laptops on public Wi-Fi makes the device vulnerable to hacking.
SIM card swap:
SIM card swapping or a SIM hijack isn’t precisely the easiest way of hacking smartphone data, but it’s becoming increasingly popular. This method enables a hacker to trick a mobile carrier into transferring variety to them, potentially resulting in the user losing control over their social media accounts, banking apps, and other sensitive logins and data. Essentially, any service that uses an OTP for authentication is often compromised by this method, making it very dangerous. Most Important you should remember, your Aadhar authentication also happens via OTP.
How to prevent your smartphone from being hacked?
While in the case of pegasus spyware, there is often not much a user can do to prevent hacking, but if we see in most cases, small things can help you to reduce your chances of being hacked.
Don’t share anything, when it comes to your smartphone.
Additionally, hackers can steal your information if they get access to your smartphone this is the easiest way they do it. So what you need to do is keep using six-character passcodes (and not your birth date) or complex patterns. It also secures all apps with additional app locks, in case they may carry any sensitive information.
SIM Card locking
Choose a unique passcode on your SIM card which can protect it from being hacked.
On an iPhone, you can head to Settings > Cellular > SIM PIN. Do enter your existing PIN to enable the lock. On Android, you can head to Settings > Lock screen and Security > Other security settings > Set up SIM card lock, and enable the option to lock your SIM card. Always remember to keep your Wi-Fi and Bluetooth off, when not in use.
Consequently, whenever you are not using it, and especially when you are in public, turn off your Wi-Fi and Bluetooth because It is possible to hack a smartphone using Wi-Fi or Bluetooth.
Pakistan’s Tourism & the ‘unprecedented’ beauty of Gilgit-Baltistan
New form of Cricket aims to entertain the crowd
The Importance of Securing Social Media Platforms
Humanity Before Politics: Practicing kindness & humility
Noor Mukaddam Murder: Compromised System, robbing of Justice
Stay tuned to Baaghi TV for more. Download our app for the latest news, updates & interesting content!