Phone Scams: The new Threats and Vulnerabilities

Icon

The evolving malwares are posing a new set of threats to phone users and exposing them to new realms of Phone scams. It is becoming increasingly difficult to deal with the new challenges. Both Android and Apple IOS are facing increasing number of attacks that are built to disguise and infiltrate. Some of the methods of disguise being used are as follows:

  • 1. Sophisticated programming and technology is being used to disguise the malware as a legitimate application. This app does not ring the alarm bells in android and apple security establishments. These apps are sometimes hiding the malware code within themselves or sometimes they are designed to misbehave when they reach the host database.
  • 2. A new Android Trojan malware opens fake pages when you open your internet banking or mobile banking page. It resembles very much like the page you were trying to open and meticulously copies the details as they come on the page. It tricks you into entering your login details on that page. It asks for your login information and steals your credentials.
  • 3. New Android Ransomware opens pages that resemble to those of Google. It also displays fake FBI warning messages to gain your trust. It then asks for your login information or simply gains access to the root directory. Once within your phone, it is able to encrypt files, images, stored documents, cookies etc. It is also able to change the phone access PIN thereby locking you out till you pay the ransom demanded by the hackers.
  • 4. Apple becoming more vulnerable: Apple IOS is more famous for the stringent checks it applies over apps before they can get access to Apple Store. But now the scammers are finding a way to bypass Apple security system and gain access to the store. They can do things from displaying ads, asking people to click them. They are then directed to another webpage where they are lured into entering their information. This stolen information is then sent to a remote location from where scammers can misuse it. Sometimes, on gaining access to the mobile database, these malicious apps can send customer information even without requiring their authentication. One of the worst Malwares that infected Apple was ‘XCodeGhost’. It gave apple quite a tough time when it infected around 4000 apps and many more mobile devices.