Tuesday, December 6, 2022





Most people think that their smartphones are safe from attack even when they are turned off, but this is not the case. Hackers can remotely access your phone and turn it on without you knowing. They can then use the phone to eavesdrop on conversations, read text messages, and even take pictures.

Once they have access, they can do anything from downloading your personal information to installing malicious software. So, even when your phone is turned off, be sure to keep it in a safe place where only you have access to it.

Many smartphones have a built-in SIM card that can store information and be accessed even when the phone is turned off. So, if a hacker were to get access to your SIM card, they could potentially gain access to all of your data including contacts, emails, and text messages.

Smartphones are increasingly becoming targets for hackers and other malicious individuals. Hackers can exploit vulnerabilities in the software or firmware to gain access to the phone.

Attacks Tested and Proven Successful

The United States Department of Homeland Security issued a warning to the public. When the researchers tested the software devices and found that “the phone was still vulnerable to attack even though it was powered off”. They were able to show it by taking the phone apart and soldering wires that let them access and alter firmware, which is a computer program that is embedded into a hardware device. The hackers could gain access to all the data within smartphones even while turned off.

These smart-mobile devices are no longer secure, says new research. Most smartphones run on an operating system called Android, developed by Google.

When our smaller devices leak tiny electronic signals that can be captured from several feet away and used to monitor keystrokes, suggests new research. The findings are a step toward better understanding the growing threat of hacking through something experts call side-channel analysis.

Researchers from Georgia Tech have discovered a vulnerability that could give hackers access to your iPhone even when it’s turned off. Users are advised to not let their phones out of their sight.

Low Power Mode (LPM)

Most wireless chips in an iPhone stay on even when the device is turned off according to research. The vulnerability is a result of the Low Power Mode (LPM) functionality included in Apple’s iPhones and results in an increased risk of data theft, breaches, and fraud.

LPM is a subsystem for Bluetooth LE and allows attackers to turn the device into a tracking device by design. While Apple may have good intentions behind its new peripheral manager (LPM) system for Bluetooth devices, researchers from Kaspersky Lab say that its design is flawed.

While Apple will most likely fix the issues with LPM in a future iOS update, researchers warn that the current firmware could be used to track devices even after they have been turned off. This makes it potentially vulnerable to attacks such as ransomware and spyware.

Is Find My Feature a threat?

Despite the fact that Apple’s ‘Find My’ feature can run malicious software, researchers found it to be low volume and dangerous. They worry that international criminals could carry out surveillance on their targets via the ‘always-on’ trick. As mobile devices continue to advance in attractiveness for areas like timestamping, payments, and logging into websites, researchers want to understand how iPhone malware will improve.

Apple will likely continue to provide a way for the user of a lost or stolen phone to access certain services even if the phone is turned off. This makes sense in cases where a stolen iPhone could still be monitored by the attacker but ultimately isn’t as secure as offering no functionality when a phone is powered down.

Scientific Researches and Processes of Attacks

Hackers can access your phone or laptop without being connected to the internet. They do this by analyzing the signals that your device gives off, even when it isn’t connected.

The researchers developed a metric for measuring the strength of computer emissions, which they call a “side-channel signal” in order to make security efforts more efficient.

Today, you can find microphones under tables to capture “acoustic emissions” (sounds produced by electronic components) that would otherwise be inaudible.

To find hacking opportunities, data on power fluctuations can be measured by plugging a fake battery charger into adjacent power outlets on the wall. Harmful emissions are created by voltage regulators that carry signals to other parts of the laptop.

Technicalities vs. Safeguarding

The researchers said that “Apple takes privacy and security very seriously,” and they do not recommend disabling the “Find My” features on an iPhone, iPad, or Mac. There are steps users can take to only share location information with people they trust.

Researchers have found that the security of your smartphone was not guaranteed even when devices are powered down. According to researchers, a flaw can be exploited by an attacker to track its victim via Bluetooth.

Smartphones are increasingly becoming ubiquitous and personal. Not only for the younger generation but for many people of all ages. Even though there are some privacy concerns to be aware of it’s difficult to avoid using them completely.