BOOM

Trending Searches

    SUPPORT
    BOOM

    Trending News

      • Fact Check 
        • Fast Check
        • Politics
        • Business
        • Entertainment
        • Social
        • Sports
        • World
      • Law
      • Explainers
      • News 
        • All News
      • Decode 
        • Impact
        • Scamcheck
        • Life
        • Voices
      • Media Buddhi 
        • Digital Buddhi
        • Senior Citizens
        • Videos
      • Web Stories
      • BOOM Research
      • BOOM Labs
      • Deepfake Tracker
      • Videos 
        • Facts Neeti
      • Home-icon
        Home
      • About Us-icon
        About Us
      • Authors-icon
        Authors
      • Team-icon
        Team
      • Careers-icon
        Careers
      • Internship-icon
        Internship
      • Contact Us-icon
        Contact Us
      • Methodology-icon
        Methodology
      • Correction Policy-icon
        Correction Policy
      • Non-Partnership Policy-icon
        Non-Partnership Policy
      • Cookie Policy-icon
        Cookie Policy
      • Grievance Redressal-icon
        Grievance Redressal
      • Republishing Guidelines-icon
        Republishing Guidelines
      • Fact Check-icon
        Fact Check
        Fast Check
        Politics
        Business
        Entertainment
        Social
        Sports
        World
      • Law-icon
        Law
      • Explainers-icon
        Explainers
      • News-icon
        News
        All News
      • Decode-icon
        Decode
        Impact
        Scamcheck
        Life
        Voices
      • Media Buddhi-icon
        Media Buddhi
        Digital Buddhi
        Senior Citizens
        Videos
      • Web Stories-icon
        Web Stories
      • BOOM Research-icon
        BOOM Research
      • BOOM Labs-icon
        BOOM Labs
      • Deepfake Tracker-icon
        Deepfake Tracker
      • Videos-icon
        Videos
        Facts Neeti
      Trending Tags
      TRENDING
      • #Operation Sindoor
      • #Pahalgam Terror Attack
      • #Narendra Modi
      • #Rahul Gandhi
      • #Waqf Amendment Bill
      • #Arvind Kejriwal
      • #Deepfake
      • #Artificial Intelligence
      • Home
      • Decode
      • What To Do When Your Mobile Is...
      Decode

      What To Do When Your Mobile Is Hacked? Experts Explain

      BOOM spoke to experts who provided insights on potential indicators of a compromised phone and tips for addressing it.

      By - Hera Rizwan | 6 Nov 2023 11:43 AM IST
    • Boomlive
      Listen to this Article
      What To Do When Your Mobile Is Hacked? Experts Explain

      Last week, several opposition leaders in India received an identical message on their iPhones. “State-sponsored attackers may be targeting your iPhone,” the message read.

      Among the politicians who received the alert were Trinamool Congress MP Mahua Moitra, MP and chief of the All India Majlis-e-Ittehadul Muslimeen party, Asaduddin Owaisi, Shiv Sena MP Priyanka Chaturvedi and Congress leader Shashi Tharoor and party's spokespersons, Pawan Khera and Supriya Shrinate.

      However, the tech giant Apple on October 31, issued a statement saying that it does not attribute “state-sponsored attack” alerts to any specific state-sponsored attacker. "It’s possible that some Apple threat notifications may be false alarms, or that some attacks are not detected. We are unable to provide information about what causes us to issue threat notifications, as that may help state-sponsored attackers adapt their behaviour to evade detection in the future,” the statement said.

      Well, just the idea of someone else infiltrating our smartphone can be truly unsettling. Furthermore, unlike the high-end tech giant Apple, many Android phones are not even built in a way to alert users about potential remote breaches. BOOM spoke to experts who outlined potential indicators of a phone hack and offered advice on how to address such suspicions on our part.

      Also Read:Data Breach Of 81 Crore Indians: What Has Been Leaked?

      What are the potential signs of a hacked phone?

      Speaking to BOOM, security researcher Sayaan Alam enlisted multiple signs which can indicate that a phone has been compromised. "These include unexplained battery drain, unusual data usage, and presence of screen-sharing mobile applications such as TeamViewer or AnyDesk (when they are not consciously downloaded by the owner) on the phone. When we notice these unusual behaviour on our devices, it's essential to investigate further to determine whether the phone has been hacked," he said.

      Adding on to the list of suspicious signs, Ashish Jha, co-founder of Bluefire Redteam, a cybersecurity firm, told BOOM that the sudden disappearance of certain messages on our devices when we attempt to open them might indicate a potential hacking attempt.

      He further added, "Many applications we download often request OTPs for verification purposes. Occasionally, these OTPs are automatically entered without manual input. This behaviour could be a potential red flag for a hack, as malicious apps employ this tactic to gain unauthorised access to our devices."

      Also Read:A Teenager’s Instagram Got Hacked And The Family Is Still Paying The Price

      What are the ways in which a phone can be hacked?

      According to Alam, phones can be hacked via installation of malware and malicious apps, falling victim to phishing attacks, or even gaining physical access to the device.

      Talking about a recent case of a hacked phone, Alam explained, "A victim contacted me and told me that someone called them for Paytm KYC and asked to install the AnyDesk application on their mobile. The person installed it as per the instruction and ended up losing all their documents and photos as the mobile phone was running itself from the scamster's end."

      Highlighting the most sought-after way being used by hackers nowadays, Jha said, "Sharing malicious links, in the garb of a photo editing app or an AI app, via social media has become exceedingly easy and popular now. These links get clicks very easily and in no time hackers get access to an individual's financial details."

      Circulating malicious links via encrypted WhatsApp messages or embedding them in the YouTube video descriptions is also very common. "For instance, you get a malicious pdf or any other media file on WhatsApp and you open it via a local file manager. This can also be used by hackers to gain access to your phone," said Jha.

      Jha also cautioned against using unsecured free WiFi, as it can be a potential hacking tactic. He said, "Suppose you travelling on a train and we usually have a habit of connecting to the free IRCTC WiFi. However, that WiFi connection could be a malicious one and just have the same name as IRCTC."

      He told BOOM how to differentiate a secured WiFi connection from an insecure one. "Once you are connected to the unsecured WiFi and you try to search something on Google, one must be wary of the link which Google is fetching. If it is 'http' instead of 'https', then that is a sign of an unsecured WiFi."

      Also Read:Locked Aadhaar Leaves Assam Residents Without Jobs

      How to respond to a suspected phone hack?

      One must run antivirus software on their devices on the slightest suspicion of hacking. These software flag if the device has been hacked. Talking about the successive steps, Alam advised isolating the device by disconnecting from the internet immediately and checking for unusual applications, if any, and uninstalling them right away. "If the problem still persists, the victim should to take a backup of their data and factory reset their mobile phone," he said.

      Uninstalling the suspicious app is a default step, however, as pointed out by Jha, one may not be able to uninstall it if it is a sophisticated application. "The best resort, in this case, is to factory reset it."

      A factory reset of a phone, also known as a hard reset or master reset, is a process that erases all the data and settings on the device, restoring it to its original factory condition. The feature is available in the 'Settings' option of every mobile phone.

      Some of the antivirus apps recommended by Jha include, ESET Mobile Security, Malwarebytes, Norton Mobile Security, TotalAV and McAfee Total Protection.

      In addition to the standard security practices that individuals should regularly adopt to enhance their protection against potential hacks, Alam suggested enabling two-factor authentication (2FA) on their accounts for added security and using encrypted messaging apps for private communications. "Keep a backup of your data regularly so that you don't lose your data in case of compromise," he added.

      Also Read:Write Reviews, Earn Money: How Cyberpolice Cracked The Fraud


      Tags

      Apple iPhone#Hackingcyber security
      Read Full Article

      Next Story
      Our website is made possible by displaying online advertisements to our visitors.
      Please consider supporting us by disabling your ad blocker. Please reload after ad blocker is disabled.
      X

      Subscribe to BOOM Newsletters

      👉 No spam, no paywall — but verified insights.

      Please enter a Email Address
      Subscribe for free!

      Stay Ahead of Misinformation!

      Please enter a Email Address
      Subscribe Now🛡️ 100% Privacy Protected | No Spam, Just Facts
      By subscribing, you agree with the Terms & conditions and Privacy Policy connected to the offer

      Thank you for subscribing!

      You’re now part of the BOOM community.

      Or, Subscribe to receive latest news via email
      Subscribed Successfully...
      Copy HTMLHTML is copied!
      There's no data to copy!