Called Ghost Touch, a new type of cyberattack has been discovered by researchers and it works by accessing your mobile screen without even having to touch it.
It seems that cybercrime always manages to go a step further and surprise everyone with new techniques.
you know the phishingscams or the use of malware to infect devices, but China’s Zhejiang University and Germany’s Darmstadt University of Technology have now discovered a new method based on hardware that cybercriminals can use to get hold of your smartphone.
Called Ghost Touch, they could unlock the mobile and use it to access confidential data, such as passwords or banking applications and even install malware. As they explain, the attack uses “electromagnetic interference (EMI) to inject dummy touch points into a touch screen without physically touching it”.
Mention that this new attack is targeted. That is to say, it is necessary to know the model and brand of the victim’s mobile to be able to tune the device. The attacker might also need additional information about it, such as the access code, which must be acquired through social engineering.
This new method works with up to 9 smartphone models
The attack works from a distance of up to 40mm and takes advantage of the sensitivity of the touch screen to EMI. Attackers can inject electromagnetic signals into the screen’s embedded electrodes to register them as touch events (a touch, exchange, press, or hold).
It has been shown that works on 9 smartphone models, including iPhone SE (2020), Samsung Galaxy S20 FE 5G, Redmi 8 and Nokia 7.2.
“Unfortunately, the most common places are public places where people place their phones face down on the table. Attackers prepare the equipment under the table in advance and launch the attack remotely. The user may not even realize it. notice that your device has been hacked”explained NordVPN cybersecurity expert Adrianus Warmenhoven.
If a user’s screen has been hacked, it will start working on its own. For example, will start answering calls on behalf of the user or will unlockthey explain from NordVPN.
Another obvious sign of a hacked mobile is when it starts opening random web pages, logging into the user’s bank account, opening files, playing a video or typing on Google without user intervention.
“You can protect yourself against touchscreen attacks in a number of ways, from adding more security to your phone to being more vigilant in public places. Don’t leave your phone unattended and you’ll greatly reduce the chances of it being hacked.”they advise.