Android Hacked

1 view
Skip to first unread message

Reginald Hanfy

unread,
Aug 3, 2024, 2:34:56 PM8/3/24
to phocentpela

Some of the most common signs of a hacked Android phone include unexpected shutdowns, reboots, and file deletion, as well as high mobile data usage, unexplained online purchases, and abrupt setting changes.

In the event of a hacked device, you should first head over to your password manager and change all of your passwords and login details. This will secure your privacy and ensure your personal information and banking details are not compromised.

Yes. Using a VPN is a preventative measure you can take to stop your device from being infected with malware. By securing your connection with a VPN service, you can keep your data safe when browsing on public Wi-Fi and prevent falling prey to a hacked Android phone.

I have 500k active users. My application has been probably hacked. How do I know that? My production versions are 3.x.y But I can see in Firebase statistics that 1% (about a few thousand) users use version 4.0.0. I have never released app with that version. Probably somebody just changed app version and I assume ad ids. He didn't even remove Firebase analytics so I can see that the hacked app is live. I use standard ProGuard obfuscation but as we can see it didn't help.

If the result is something like a web browser then it is harder as the user got the app from a website. Then your best option is Google searching. The normally easiest way is include your app name and the word "APK". This tends to find most sites serving your app. You could even search for your app name, "APK" and "4.0.0" as many website list the version code on the page.

Under our standard disclosure policy, Project Zero discloses security vulnerabilities to the public a set time after reporting them to a software or hardware vendor. In some rare cases where we have assessed attackers would benefit significantly more than defenders if a vulnerability was disclosed, we have made an exception to our policy and delayed disclosure of that vulnerability.

Due to a very rare combination of level of access these vulnerabilities provide and the speed with which we believe a reliable operational exploit could be crafted, we have decided to make a policy exception to delay disclosure for the four vulnerabilities that allow for Internet-to-baseband remote code execution.

Too bad Google is way late with March updates for pixel 6, that I know of! SMDH No word on when we can expect it either, except one reference I found yesterday, March 20th. Thanks Graham, for the heads up!

Just based on a quick comparison using gsmarena (not affiliated with them but they have an astounding amount of information on various cell phones), the devices above *are* the impacted ones. When he talks about the chipset specifically, it's about a vehicle and not a phone.

I have been having trouble with getting hacked like this for over a year now and its been mostly samsung and motorola phones purchased right here in the states. We are still being hacked every time we get a new phone.

LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.

I recently switched from an iPhone to a android phone (brand to remain un-named). The motivation was the powerful CPU, a better camera and better integration of Google's effective applications: gmail, calendar, drive, contacts, and docs. My excitement quickly vanished when my new android device was hacked within the first month!

How did I know it was hacked? A mysterious cursor showed up on the home screen and this cursor was being controlled remotely. The remotely-controlled cursor was clicking on different numbers as I tried to enter my PIN code to unlock my phone. Eventually, the remote cursor was clicking and running AppInfo on my apps! I powered down the phone and called Verizon support. Verizon told me to remote the SIM immediately to terminate any further communication with the phone. Fortunately, I had saved my trusty old iPhone, raced to my local Verizon store, requested a new SIM card, and fired up my old iPhone to regain control of my phone number.

I followed up with Verizon in a series of phone calls and chat sessions with Verizon support. Verizon has a web page on the verizonwireless site where you can report security incidents. I spoke with a representative in the "security center" and that was supposed to open an "investigation" and I've never heard back from Verizon. Do they care, or are these incidents too numerous to investigate -- hard to tell -- I suspect the latter?

These steps depend on the apps installed on my smartphone, and what the hackers may have accessed. In my case, the installed apps provided access to email accounts, two-factor authentication apps (like Google Authenticator) and not too much else. So my next protection steps were pretty simple:

If I had my personal financial apps, like banking or brokerage, on my smart phone, then I would have needed to quickly change all of the passwords, and take similar steps to restore two-factor authentication where applicable.

The question remains, what enabled this hack to occur? Did it start by using WiFi on an unsecured public network (we'll talk about this a bit more)? Did the hackers exploit vulnerabilities in android device or the android OS itself? Was it caused by installing a malicious app? All are possibilities.

Unsettling. If this is not the exact cause it still speaks volumes to the nature of security threats we face as everyday consumers. It is possible that this hack began installing a malicious app, although I have a relatively small number of reputable apps installed on my phone. It is also possible that Verizon's Security & Privacy app might NOT protect against this type of malicious app threat -- again hard to know.

Unsecured public WiFi: Upon reflection, I recalled using a few unsecured public WiFi networks with my android. I now realize that the time has come when we should NEVER use unsecured public WiFi networks. And it continues to astound me just how many hotels offer unsecured WiFi service to their unsuspecting customers without apparently realizing the inherent risks to their online security.

These kinds of precautions can be intimidating for non-technical folks, or perhaps older people that have difficulty comprehending all this techno-mumbo-jumbo. If you fall into this category, or care about someone that does, you might consider some relatively simple approaches:

As a final note -- this is offered as a cautionary tale with the intent that it may help you avoid a similar incident, or limit your exposure if you face a similar situation. I do not have a horse in the Apple iPhone versus Android religious race -- I am simply recounting this smartphone hack incident that happened on an android device. It is entirely plausible that similar security risks exist in the iOS iPhone space. I have some other "beefs" with Apple that I will not delve into here.

In any event, I recommend most of these precautions regardless of your smartphone OS or brand. We have spent the past two decades doing more and more things on the Internet. And it is time that we apply much higher scrutiny to what we do online, how we do those things, and to consider restricting what we do online much more. Be careful out there.

There are a number of different phone hacking techniques. One of the most common is to fool the user into clicking on a malicious link, or into downloading software from a fake app store or elsewhere through what's known as social engineering, often through the use of phishing emails. Fake public wifi networks can often fool the unsuspecting. Another technique involves a SIM swap, in which an attacker persuades a victim's mobile provider to transfer their SIM card to a device under their control; infected USB cables or charger cables can also allow an attacker access. And once an attacker has found a way in, a user's data can be exposed, especially where passwords have been reused.

Perhaps the most high-profile hack of a phone came in 2019, when the Twitter account of the company's CEO, Jack Dorsey, started tweeting out a string of bizarre posts. It was immediately clear that his account had been hacked.

Installing and running a reputable security software package should reveal for sure whether a phone has actually been hacked. Find and remove any malware or spyware that may have infected the phone using popular packages are available from the likes of:

Whether or not you've been hacked already, there are a number of basic cybersecurity measures you can take to keep your phone safe from attackers in future. The first, and most straightforward, is to make sure you have a good security package, like one of those listed above, installed, and keep it updated.

Falling victim to a phone hack can have a devastating impact, affecting everything from friendships to your bank account. Fortunately, it's possible to recover, and there are ways to make it much less likely that it happens again.

If the hacker is someone close to you, which is often the case, they may be able to guess your password based on what they know about you. Ensure that your password is strong enough to prevent people close to you from getting into your phone.

Scanning your phone for suspicious apps and files is simple with the Certo Mobile Security app, which can help you uncover and remove malware and cyberthreats for good. All you need to do is download the free app from the Google Play Store and tap the Scan button.

? Note: Clearing the system cache won't delete any personal data or settings, but always ensure you have important data backed up before performing any system-level operations.

If you're unsure about any step or if you have a specific device model in mind, always refer to the device's official user manual or support website for precise instructions.
6. Do a factory resetA factory reset restores your Android phone to the state it was in when you first bought the phone.

c80f0f1006
Reply all
Reply to author
Forward
0 new messages