May 2, 2025
Trending News

Ghost Touch is a new method that allows cybercriminals to remotely hack smartphones.

  • May 18, 2023
  • 0

Researchers at NordVPN have shed light on a new hacking method called GhostTouch, which allows cybercriminals to remotely unlock certain smartphones without installing malware. By using electromagnetic signals

Researchers at NordVPN have shed light on a new hacking method called GhostTouch, which allows cybercriminals to remotely unlock certain smartphones without installing malware. By using electromagnetic signals to mimic gestures such as fingers and taps, hackers can gain unauthorized access to sensitive data such as passwords and banking apps, and even install malware. Although the attack requires the attacker’s equipment to be close to the victim, public places where smartphones are often placed face down on tables are prime targets for such sophisticated attacks.

The attack can only be carried out at a distance of up to 40 mm.

GhostTouch was first discovered by scientists from Zhejiang University in China and Darmstadt Technical University in Germany. By sending electromagnetic signals to the target device, cybercriminals can manipulate the device’s touchscreen and remotely simulate user interaction. This revolutionary technique takes advantage of the common behavior of people who accidentally expose their smartphones to the potential risk of hacking in public places such as libraries, cafes, and conference rooms. Attackers strategically place their equipment under the table, allowing them to carry out the attack without arousing suspicion or warning the victim.

According to NordVPN, the attack can be carried out at a distance of up to 40mm, allowing attackers to sneak the necessary equipment under the table and take control of the target smartphone. While attackers need to be close at first, distance becomes insignificant once a connection is established. So far, nine smartphone models have been confirmed to be vulnerable to GhostTouch, including the iPhone SE (2020), Samsung Galaxy S20 FE 5G, Redmi 8 and Nokia 7.2.

One of the features of GhostTouch is that users realize that their smartphone is working on its own, indicating that unauthorized access is allowed. It’s worth noting that the large number of reports with more than 209 million results when a Google search for “phone turns on by itself” could potentially be related to GhostTouch attacks. For this reason, it is very important for smartphone users to be careful and take the necessary precautions.

It is important to implement robust security mechanisms on smartphones to protect against GhostTouch and similar hacking attempts. Users are strongly encouraged to use security features such as PIN codes, fingerprint patterns or biometrics to further protect their devices. By using these security measures, people can greatly reduce the risk of falling victim to this annoying hacking technique.

GhostTouch is a chilling reminder of the evolution of cybercrime, where hackers continue to exploit vulnerabilities in smartphones. The method’s ability to remotely unlock smartphones and gain access to sensitive data highlights the importance of staying alert and proactive when enforcing security measures. By being informed and following strict security measures, users can effectively protect their smartphones and valuable personal information from falling into the wrong hands.

Source: Port Altele

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version