In an age where digital security is a paramount concern, a new threat called GhostTouch is causing a stir. Discovered by researchers from Zhejiang University in China and Darmstadt University of Technology in Germany, this alarming technique allows cybercriminals to hack smartphones remotely.
Unlike traditional hacking methods where malware is installed via charging cables or phishing links, GhostTouch, as the name suggests, uses electromagnetic signals to simulate touch events on the target smartphone’s screen, turning it into a threat. more insidious to unsuspecting users.
NordVPN researchers, who have been at the forefront of raising awareness of this issue, emphasize the importance of vigilance. They advise users to watch out for seemingly spontaneous unlocks of their smartphones, a telltale sign of a GhostTouch attack.
The goal of these cybercriminals is not just to unlock your phone, but to take remote control of the device, allowing them to access sensitive data and passwords, use insecure services, and even install malware. This elevates the potential harm beyond invasion of privacy to potentially dangerous tampering with the device.
What makes GhostTouch even more concerning is that attackers only need to be in close proximity to their victims to launch the attack. By discreetly placing their equipment in public places like libraries, coffee shops, or conference lobbies, they can transmit the electromagnetic signals necessary for the GhostTouch attack. Alarmingly, this can happen without the victim even realizing it, making public spaces a focus for such attacks.
According to NordVPN, the attack can work from a distance of up to 40mm, meaning the hacker’s team could get under a table or other nearby surface and still gain access to the smartphone. So far, nine smartphone models have been confirmed to be susceptible to the GhostTouch attack. This list includes the iPhone SE (2020), Samsung Galaxy S20 FE 5G, Redmi 8, and Nokia 7.2.
To protect yourself against GhostTouch, experts recommend making sure your smartphone has a robust security mechanism in place. This could be a PIN code, a swipe pattern, or a biometric security measure like a fingerprint or facial recognition. It’s a sobering reminder that in the age of increasing digital connectivity, staying one step ahead of cybercriminals is as important as ever.
As the GhostTouch threat looms, it is crucial that individuals and organizations prioritize mobile security. The digital landscape is evolving and with it, the threats we face. GhostTouch is a stark reminder that as our reliance on technology grows, so does the sophistication of those who seek to exploit it.
Follow us on Twitter through @Geeksroom and do not miss all the news, free courses and other articles. You can also follow us through our canal de Youtube to see our videos and through Instagram to see our images!
Source: Geeks Room by geeksroom.com.
*The article has been translated based on the content of Geeks Room by geeksroom.com. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!
*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.
*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!