{"id":17168,"date":"2019-12-11T11:10:04","date_gmt":"2019-12-11T19:10:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/12\/11\/news-10904\/"},"modified":"2019-12-11T11:10:04","modified_gmt":"2019-12-11T19:10:04","slug":"news-10904","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/12\/11\/news-10904\/","title":{"rendered":"The little-known ways mobile device sensors can be exploited by cybercriminals"},"content":{"rendered":"<p><strong>Credit to Author: Logan Strain| Date: Wed, 11 Dec 2019 17:51:03 +0000<\/strong><\/p>\n<p>The bevy of <a rel=\"noreferrer noopener\" aria-label=\"mobile devices (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/12\/all-the-reasons-why-cybercriminals-want-to-hack-your-phone\/\" target=\"_blank\">mobile device<\/a> sensors in modern smartphones and tablets make them more akin to pocket-sized laboratories and media studios than mere communication devices. Cameras, microphones, accelerometers, and gyroscopes give incredible flexibility to app developers and utility to mobile device users. But the variety of inputs also give clever hackers new methods of bypassing conventional mobile security\u2014or even collecting sensitive information outside of the device. <\/p>\n<p>Anyone who is serious about security and privacy, both for themselves and for end users, should consider how these sensors create unique vulnerabilities and can be exploited by cybercriminals.<\/p>\n<p>Hackers of every hat color have been exploiting mobile device sensors for years. In 2012, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.pcworld.com\/article\/2010860\/PlaceRaider-app-lets-phone-camera-spy-on-people.html\" target=\"_blank\">researchers developed malware called PlaceRider<\/a>, which used Android sensors to develop a 3D map of a user\u2019s physical environment. In 2017, <a href=\"https:\/\/www.huffpost.com\/entry\/are-the-sensors-in-your-phone-a-security-risk_b_5a4353fbe4b0df0de8b06784\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">researchers used a smart algorithm<\/a> to unlock a variety of Android smartphones with near complete success within three attempts, even when the phones had fairly robust security defenses.\u00a0<\/p>\n<p>But as updates have been released with patches for the most serious vulnerabilities, hackers in 2019 have responded by finding even more creative ways to use sensors to snag vulnerable data.<\/p>\n<h3>\u201cListening\u201d to passwords<strong><\/strong><\/h3>\n<p>Researchers were able to learn computer passwords by accessing the sensors in a <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.pymnts.com\/news\/security-and-risk\/2019\/hackers-passwords-microphone\/\" target=\"_blank\">mobile device\u2019s microphone<\/a>. The Cambridge University and Linkoping University researchers created an <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/how-artificial-intelligence-and-machine-learning-will-impact-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"artificial intelligence (AI)  (opens in a new tab)\">artificial intelligence (AI) <\/a>algorithm that analyzed typing sounds. Out of 45 people tested, their passwords were cracked seven times out of 27. The technique was even more effective on tablets, which were right 19 times out of 27, inside of 10 attempts.<\/p>\n<p>\u201cWe showed that the attack can successfully recover PIN codes, individual letters, and whole words,\u201d the researchers wrote. Consider how easily most mobile users grant permission for an app to access their device\u2019s microphone, without considering the possibility that the sound of their tapping on the screen could be used to decipher passwords or other phrases. <\/p>\n<p>While this type of attack has never happened in the wild, it\u2019s a reminder for users to be extra cautious when allowing applications access to their mobile device\u2019s mic\u2014especially if there\u2019s no clear need for the app\u2019s functionality.<\/p>\n<h3>Eavesdropping without a microphone<strong><\/strong><\/h3>\n<p>Other analysts have discovered that hackers don\u2019t need access to a device\u2019s microphone in order to tap into audio. Researchers working at the University of Alabama at Birmingham and Rutgers University eavesdropped on audio played through an Android device\u2019s speakerphone with just the accelerometer, the sensor used to detect the orientation of the device. They found that sufficiently loud <a href=\"https:\/\/www.scmagazineuk.com\/android-phones-accelerometer-eavesdrop-audio-via-its-speakerphone\/article\/1591942\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">audio can impact the accelerometer<\/a>, leaking sensitive information about speech patterns. <\/p>\n<p>The researchers dubbed this capability as \u201cspearphone eavesdropping,\u201d stating that threat actors could determine the gender, identity, or even some of the words spoken by the device owner using methods of speech recognition or reconstruction. Because accelerometers are always on and don\u2019t require permissions to operate, malicious apps could record accelerometer data and playback audio through speech recognition software. <\/p>\n<p>While an interesting attack vector that would be difficult to protect against\u2014restricting access or usage of accelerometer features would severely limit the usability of smart devices\u2014this vulnerability would require that cybercriminals develop a malicious app and persuade users to download it. Once on a user\u2019s device, it would make much more sense to drop other forms of malware or request access to a microphone to pull easy-to-read\/listen-to data. <\/p>\n<p>Since modern-day users tend to pay little attention to permissions notices or EULAs, the advantage of permission-less access to the accelerometer doesn\u2019t yet provide enough return on investment for criminals. However, we once again see how access to mobile device sensors for one functionality can be abused for other purposes.<\/p>\n<h3>Fingerprinting devices with sensors<strong><\/strong><\/h3>\n<p>In May, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.zdnet.com\/article\/android-and-ios-devices-impacted-by-new-sensor-calibration-attack\/\" target=\"_blank\">UK researchers announced they had<\/a> developed a fingerprinting technique that can track mobile devices across the Internet by using easily obtained factory-set sensor calibration details. The attack, called <a href=\"https:\/\/sensorid.cl.cam.ac.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">SensorID<\/a>, works by using calibration details from the accelerator, gyroscope, and magnetometer sensors that can track a user\u2019s web-browsing habits. This calibration data can also be used to track users as they switch between browsers and third-party apps, hypothetically allowing someone to get a full view of what users are doing on their devices.<\/p>\n<p>Apple patched the vulnerability in iOS 12.2, while Google has yet to patch the issue in Android.<\/p>\n<h3>Avoiding detection with the accelerometer&nbsp;<strong><\/strong><\/h3>\n<p>Earlier this year, Trend Micro uncovered two <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">malicious apps on Google Play that drop wide-reaching banking malware<\/a>. The apps appeared to be basic tools called Currency Converter and BatterySaverMobi. These apps cleverly used motion sensors to avoid being spotted as malware.\u00a0<\/p>\n<p>A device that generates no motion sensor information is likely an emulator or sandbox environment used by researchers to detect malware. However, a device that does generate motion sensor data tells threat actors that it\u2019s a true, user-owned device. So the malicious code only runs when the device is in motion, helping it sneak past researchers who might try to detect the malware in virtual environments. <\/p>\n<p>While the apps were taken down from Google Play, this evasive technique could easily be incorporated into other malicious apps on third-party platforms.<\/p>\n<h3>The mobile security challenges of the future<strong><\/strong><\/h3>\n<p>Mobile device sensors are especially vulnerable to abuse because no special permissions or escalations are required to access these sensors.&nbsp;<\/p>\n<p>Most end users are capable of using strong passwords and protecting their device with <a href=\"http:\/\/www.malwarebytes.com\/android\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"anti-malware software (opens in a new tab)\">anti-malware software<\/a>. However, they probably don\u2019t think twice about how their device\u2019s gyroscope is being used.\u00a0<\/p>\n<p>The good news is that mobile OS developers are working to add security protections to sensors. <a href=\"https:\/\/developer.android.com\/about\/versions\/pie\/android-9.0-changes-all\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Android Pie tightened security<\/a> by limiting sensor and user input data. Apps running in the background on a device running Android Pie can\u2019t access the microphone or camera. Additionally, sensors that use the continuous reporting mode, such as accelerometers and gyroscopes, don\u2019t receive events.<\/p>\n<p>That means that mobile security challenges of the future won\u2019t be solved with traditional cryptographic techniques. As long as hackers are able to access sensors that detect and measure physical space, they\u2019ll continue exploit that easy-to-access data to secure the sensitive information that they want. <\/p>\n<p>As mobile devices expand their toolbox of sensors, that will create new vulnerabilities\u2014and yet-to-be discovered challenges for security professionals.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/iot\/2019\/12\/the-little-known-ways-mobile-device-sensors-can-be-exploited-by-cybercriminals\/\">The little-known ways mobile device sensors can be exploited by cybercriminals<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/iot\/2019\/12\/the-little-known-ways-mobile-device-sensors-can-be-exploited-by-cybercriminals\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Logan Strain| Date: Wed, 11 Dec 2019 17:51:03 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/iot\/2019\/12\/the-little-known-ways-mobile-device-sensors-can-be-exploited-by-cybercriminals\/' title='The little-known ways mobile device sensors can be exploited by cybercriminals'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_619717289.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Mobile device sensors offer great utility to users\u2014from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/iot\/\" rel=\"category tag\">IoT<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/accelerometer\/\" rel=\"tag\">accelerometer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/camera\/\" rel=\"tag\">camera<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google\/\" rel=\"tag\">Google<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gyroscope\/\" rel=\"tag\">gyroscope<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/internet-of-things\/\" rel=\"tag\">Internet of Things<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ios\/\" rel=\"tag\">iOS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot\/\" rel=\"tag\">IoT<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iphone\/\" rel=\"tag\">iPhone<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/microphone\/\" rel=\"tag\">microphone<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-device-sensors\/\" rel=\"tag\">mobile device sensors<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-devices\/\" rel=\"tag\">mobile devices<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-phone\/\" rel=\"tag\">mobile phone<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-phones\/\" rel=\"tag\">mobile phones<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-security\/\" rel=\"tag\">mobile security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-sensors\/\" rel=\"tag\">mobile sensors<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/iot\/2019\/12\/the-little-known-ways-mobile-device-sensors-can-be-exploited-by-cybercriminals\/' title='The little-known ways mobile device sensors can be exploited by cybercriminals'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/iot\/2019\/12\/the-little-known-ways-mobile-device-sensors-can-be-exploited-by-cybercriminals\/\">The little-known ways mobile device sensors can be exploited by cybercriminals<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22426,10462,13896,1670,23699,6269,10480,10495,8826,21243,10554,23700,11092,22086,18448,10463,23701],"class_list":["post-17168","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-accelerometer","tag-android","tag-camera","tag-google","tag-gyroscope","tag-internet-of-things","tag-ios","tag-iot","tag-iphone","tag-microphone","tag-mobile","tag-mobile-device-sensors","tag-mobile-devices","tag-mobile-phone","tag-mobile-phones","tag-mobile-security","tag-mobile-sensors"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17168"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17168\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17168"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}