Hackers target mobile phone users

Criminal cyber networks have begun creating viruses to hack into mobile phones in order to steal sensitive information off devices which are increasingly becoming mini-computers in our pockets.

After years of developing software to infiltrate computers, experts say overseas-based hacking networks have begun targeting mobile phones because tech-savvy consumers are now using them for so much more than calls.

Until recently there has been little incentive for hackers to develop dubious software – known as “malware” – for mobiles because there was only a limited number of ways to scam people. Most previous scams centred around getting people to text or call premium rate numbers, or by tricking people into giving away their bank details with fake calls.

But the ever growing numbers of smartphones – which allow users to surf the internet, shop online and email from their phones – has created a fertile market for hackers to exploit in a similar way to how they target PCs, experts warn. Software already exists for the iPhone which allows a jealous lover to keep a record of every single call, email or web surf that Apple’s highly popular phone makes. The so-called “spy tool” has to be uploaded manually onto the phone but analysts fear hackers will soon work out how to install such software remotely.

“At the moment the amount of malware out there specifically aimed at mobile phones is thankfully quite low, we're probably where PCs were ten years ago,” says Sean Sullivan, a security advisor at Finnish cyber-security company F-Secure, which has been tracking mobile malware. “But at some point soon someone will develop a killer application that is very successful at hacking into phones and all the bad guys will take notice. Nowadays a phone is probably the single biggest personal database you carry around with you on a daily basis so it has become a sensitive and lucrative device to exploit.”

Earlier this year two viral worms emerged out of China that were the first to infiltrate a mobile phone user’s contact book and send hundreds of spam text messages to their friends. The worms exploited smartphones operating on Symbian OS software which is predominantly used by Nokia. Symbian have since closed the loophole that allowed the virus in but analysts believe such worms could herald the beginning of a new hacking era where criminals target our phones as well as our computers.

“Those two worms were particularly interesting because they were the closest thing we’ve seen on a mobile phone that resembles a bot-net attack,”says Rik Ferguson, a cyber security expert at Trend Micro, referring to the most common type of hacking method used to target ordinary computers. “The cyber security industry is often accused of crying wolf and I think sometimes that is the case. We’ve been warning about malware for mobiles for many years and it lulls people into a false sense of security. But we do now need to start paying attention to mobile phones.”

Because mobile phone users are now using their phones to make financial transactions, Ferguson argues, it is only a matter of time before the hackers start to target mobile devices en masse.

“Without wanting to sound too alarmist, the more people use their phones to carry out sensitive financial transactions, such as banking or shopping online through their phones, the more the same criminal networks that target our computers will start developing ways to attack our phones,” he said.

Fear of hackers was part of the reason why it took so long for Barack Obama to have his White House Blackberry cleared by his security team. Previous Presidents have steered clear of the devices, fearing they could be easily inflitrated.

Mobile phone manufacturers are usually tight lipped about highlighting the potential flaws in their products but last month a senior Google executive admitted that hackers would begin to target mobile phones. “The smartphone will become a major security target,” said Rich Cannings, the head of Google’s Android Security team. “Personally I think this will become an epiphany to malware authors.”

The growth of third party applications which can be downloaded onto our phones is causing particular concern. In an attempt to roll back Apple’s increasing dominance of the smartphone market with their iPhone, Google have developed Android, an open-source software platform that allows those with the know how to create their own applications for phones that use the software.

Google hope Android will create a vibrant community of tech-savvy users who will invent ingenious applications in a similar way to how the iPhone community has benefited from users creating their own “Apps Store”. But while Apple insists on signing off each App before making it available to the pubic – leading to accusations that it is trying to control any applications that might lose them money – Google has taken a more open approach to Android allowing users to develop what they like.

“We wanted developers to be able to upload their applications without anyone stopping them from doing that,” said Cannings. “Unfortunately this opens us up to malware.”

Industry experts are also concerned that unlike computers, most mobile phones have no anti-viral software on them.

A new independent You Gov survey into smartphone users, commissioned by Trend Micro and The Carphone Warehouse, found that over 60 per cent of smartphones contain sensitive information such as log-in details or banking details but only 7 per cent of users have any sort of security measure on their device.

Over half of the 2000+ respondents (54 per cent) admitted to submitting their credit card details via their smartphones to purchase or download items online on the move over the last three months.

“People are simply not aware of the kinds of risks they are exposed to through their mobile devices or the amount of personal information stored there,” Mr Ferguson says. “While more and more companies are encrypting their computers, the same cannot be said of protecting personal data that resides on consumer smartphone devices.”

Start your day with The Independent, sign up for daily news emails
ebooksA special investigation by Andy McSmith
Life and Style
A picture taken on February 11, 2014 at people walking at sunrise on the Trocadero Esplanade, also known as the Parvis des droits de l'homme (Parvis of Human Rights), in front of the Eiffel Tower in Paris.
techGoogle celebrates Paris's iconic landmark, which opened to the public 126 years ago today
Scientists believe Mercury is coated in billions of years’ worth of carbon dust, after being ‘dumped on’ by passing comets
Cleopatra the tortoise suffers from a painful disease that causes her shell to disintegrate; her new prosthetic one has been custom-made for her using 3D printing technology
newsCleopatra had been suffering from 'pyramiding'
  • Get to the point
Latest stories from i100
Have you tried new the Independent Digital Edition apps?

Day In a Page

No postcode? No vote

Floating voters

How living on a houseboat meant I didn't officially 'exist'
Louis Theroux's affable Englishman routine begins to wear thin

By Reason of Insanity

Louis Theroux's affable Englishman routine begins to wear thin
Power dressing is back – but no shoulderpads!

Power dressing is back

But banish all thoughts of Eighties shoulderpads
Spanish stone-age cave paintings 'under threat' after being re-opened to the public

Spanish stone-age cave paintings in Altamira 'under threat'

Caves were re-opened to the public
'I was the bookies’ favourite to be first to leave the Cabinet'

Vince Cable interview

'I was the bookies’ favourite to be first to leave the Cabinet'
Election 2015: How many of the Government's coalition agreement promises have been kept?

Promises, promises

But how many coalition agreement pledges have been kept?
The Gaza fisherman who built his own reef - and was shot dead there by an Israeli gunboat

The death of a Gaza fisherman

He built his own reef, and was fatally shot there by an Israeli gunboat
Saudi Arabia's airstrikes in Yemen are fuelling the Gulf's fire

Saudi airstrikes are fuelling the Gulf's fire

Arab intervention in Yemen risks entrenching Sunni-Shia divide and handing a victory to Isis, says Patrick Cockburn
Zayn Malik's departure from One Direction shows the perils of fame in the age of social media

The only direction Zayn could go

We wince at the anguish of One Direction's fans, but Malik's departure shows the perils of fame in the age of social media
Young Magician of the Year 2015: Meet the schoolgirl from Newcastle who has her heart set on being the competition's first female winner

Spells like teen spirit

A 16-year-old from Newcastle has set her heart on being the first female to win Young Magician of the Year. Jonathan Owen meets her
Jonathan Anderson: If fashion is a cycle, this young man knows just how to ride it

If fashion is a cycle, this young man knows just how to ride it

British designer Jonathan Anderson is putting his stamp on venerable house Loewe
Number plates scheme could provide a licence to offend in the land of the free

Licence to offend in the land of the free

Cash-strapped states have hit on a way of making money out of drivers that may be in collision with the First Amendment, says Rupert Cornwell
From farm to fork: Meet the Cornish fishermen, vegetable-growers and butchers causing a stir in London's top restaurants

From farm to fork in Cornwall

One man is bringing together Cornwall's most accomplished growers, fishermen and butchers with London's best chefs to put the finest, freshest produce on the plates of some of the country’s best restaurants
Robert Parker interview: The world's top wine critic on tasting 10,000 bottles a year, absurd drinking notes and New World wannabes

Robert Parker interview

The world's top wine critic on tasting 10,000 bottles a year, absurd drinking notes and New World wannabes
Don't believe the stereotype - or should you?

Don't believe the stereotype - or should you?

We exaggerate regional traits and turn them into jokes - and those on the receiving end are in on it too, says DJ Taylor